The number of deployed IoT Devices is growing exponentially, and so are the cyber-attacks geared against IoT. The first large scale IoT device attack was Mirai botnet bringing down a large part of the internet. How did the attacker gain control over thousands of IoT devices? It was simply a hard coded credential that gained them access into the device's Operating System.
We are happy to announce EZCA the PKI built for your cloud scale certificate needs. EZCA will empower your security team to create highly secure and compliant certificate authorities around the world while helping them to prevent costly outages by giving them full visibility into your organizations certificates.
SSH Keys were designed for a time when SSH was protected by a strong network barrier. With today's zero trust world a stronger password-less identity story is needed. This is why we created the first agent-less AAD based authentication for Linux endpoints.
BlackHat 2021 was a great way to catch up with industry experts and talk about the latest security trends. Read our recap to learn more about the latest trends.
Following security best practices help reduce the chances of a security breach. However, companies need to be ready to detect and mitigate a breach as soon as it happens. To protect our critical infrastructure we created CloudWatcher and today we are excited to share it with the world for free!