Blog

Why DIY is DOA for IoT Security

For years, we in the computing industry have always had a safety net when it comes to securing our devices. In the past, no matter what type of device we acquired, we always could ‘add’ security applications and utilities AFTER we acquired it. We could add anti-virus or intrusion detection/prevention or web filtering and parental … Continue reading Why DIY is DOA for IoT Security

Read More

Break It, Fix It – The case for purpose-built IoT security

Spoiler alert: IoT security can’t be an add-on. We are at a key inflection point with the new Internet of Things – specifically when and how IoT security is developed and deployed. The cause of this inflection is the vastly different composition, design and intention of today’s secured IoT devices when compared to past devices. … Continue reading Break It, Fix It – The case for purpose-built IoT security

Read More

The Best Offense vs Defense for IoT Security

As Super Bowl Sunday nears I’m reminded of the old argument – what wins championships, offense or defense? You might jump to say defense right away, and while you would be statistically right, it’s not by much. See this interesting analysis from Freakonomics a number of years ago on the topic.  Why am I talking about … Continue reading The Best Offense vs Defense for IoT Security

Read More

Simplifying IoT Security for Developers: Tackling Build vs. Buy Options

For Internet of Things (IoT) solutions, the trend is toward more data, more access, and more connectivity. IoT developers are now tasked with not only bringing these solutions to market rapidly, but must also ensure that appropriate security and data protection measures are implemented from the beginning – no business can afford the high costs … Continue reading Simplifying IoT Security for Developers: Tackling Build vs. Buy Options

Read More

Notes from the Security of Things Forum in Cambridge, MA, 2016

The need for good security to protect the IoT connected world seems like an obvious statement. There are more things connecting every day and the projections from the industry watch-dogs are staggering.  Last week I attended the Security of Things Forum in Cambridge, just a short walk from the Harvard campus. The overwhelming topic was … Continue reading Notes from the Security of Things Forum in Cambridge, MA, 2016

Read More

Implementing IoT Security from Scratch is Hard; Using CENTRI is Easy

So you are a Super Star IoT application developer, or maybe you are leading the race to produce the next great Thing. Over the years you have honed your skills to the cutting edge of app and/or thing development. Although you pride yourself in constantly developing the uncommon, from time to time you need a … Continue reading Implementing IoT Security from Scratch is Hard; Using CENTRI is Easy

Read More

Gartner Security and Risk Management Summit 2016

This past week, June 13-15, members of the CENTRI team went to the Gartner Security and Risk Management Summit 2016 event in National Harbor, MD. By all accounts, it was a successful conference full of opportunities to meet others in the data security and protection industry, learn about the current state of the industry, and … Continue reading Gartner Security and Risk Management Summit 2016

Read More

Protect Your Valuable Asset: Your Data

In the world of paper and coin, if I want to protect my valuables – things like stock certificates, my grandfather’s watch, etc., I would put them in a safe deposit box at the bank. Of course, there are numerous other options: under the mattress, in the breadbox, in a coffee can buried in the back yard under the big … Continue reading Protect Your Valuable Asset: Your Data

Read More

Encryption: Could it Be a Key to Bridge the Gap Between Security and Privacy?

Earlier in 2016, after the U.S. Federal Bureau of Investigation (FBI) engaged in a legal battle with Apple over the unlocking of a particular iPhone device, little they knew it would reignite and escalate the old debate between security and privacy to unprecedented levels. On one hand, security advocates claim that one of the main … Continue reading Encryption: Could it Be a Key to Bridge the Gap Between Security and Privacy?

Read More

Dear CISO – Your Single Most Important Objective

Let’s say you’re the CISO. What is your single most important objective? I think it’s spelled out in your title “information security,” and the single most important objective for you, or any CISO, is to protect the corporations’ information – the data. More specifically, it is to prevent the exfiltration of data. The problem is, … Continue reading Dear CISO – Your Single Most Important Objective

Read More