How to Identify IoT Pitfalls and Adopt Technology with Confidence

When looking at technology adoption, I am frequently reminded of Pandora’s Box from Greek mythology. This metaphor rings true when considering the Internet of Things (IoT). Whereas Pandora released a host of evils into the world, with IoT we have released new concerns associated with multiple technologies, multiple standards, scale, and security (or as I like to say, resiliency). When considering the information that flows from the edge, through the cloud, and ultimately to the data center, the lowest common denominator for protecting information is trust created by cryptography (as noted by nCipher’s Juan Asenjo in the other half of this blog series). In this blog, we are going to start by acknowledging the pitfalls of our particular Pandora and then discuss how we find hope in the solution provided by nCipher and Fornetix.

Read more

Man jumping off a cliff

Guest Post: Before You Dive Into IoT, Do These Three Things

Olympic high diving requires concentration and self-control. Before divers jump off a 10-meter platform, they pause at the edge and concentrate on their goal: elegantly perform the acrobatic maneuver and gracefully pierce the water causing minimum surface disturbance. This same disciplined approach is required when adopting new and revolutionary technologies, such as those now available through the Internet of Things (IoT). Decision makers must assess the risks and benefits, consider potential difficulties, and then take the jump.

Read more

Wall of keys

Top 4 Challenges When Managing Encryption Issues

Implementing an encryption strategy comes with hefty baggage, but don’t worry; we’ve got you covered. In this post, we’ll cover the top four challenges of managing encryption issues and solutions to overcome them.  

Encryption key management is increasingly more important the more connected we become. With millions of devices and millions of users, there becomes an increasing need for effective cybersecurity tools that safeguard sensitive assets for individuals and organizations.

Read more