#device-security

[ follow ]
InfoQ
3 weeks ago
Information security

Inside Lyft's Glow: How IoT Architecture Is Driving Smarter Ride Experiences

Lyft's Glow emblem enhances IoT scalability and security with robust architecture, enabling effective device management in real-time across markets. [ more ]
TechCrunch
1 month ago
Startup companies

ZeroTier raises $13.5M to help avert CrowdStrike-like network problems | TechCrunch

ZeroTier raised $13.5 million in Series A funding to enhance device security amidst the CrowdStrike update chaos. [ more ]
Ars Technica
1 month ago
Information security

Secure Boot is completely broken on 200+ models from 5 big device makers

Secure Boot was adopted to protect against BIOS malware threat. The underlying threat became real with the discovery of Mebromi, the first-known BIOS rootkit, in 2011. [ more ]
GSMArena.com
4 months ago
Information security

Here's what Google is doing to protect your Android device from theft

Google introduces theft protection features for Android, making stolen devices harder to sell or extract data from. [ more ]
#zero trust
Dark Reading
10 months ago
Privacy professionals

Beyond Identity Releases New Assessment to Guide Companies Toward Zero Trust

Beyond Identity has released a free Identity and Device Zero Trust Assessment tool to help organizations evaluate their zero trust security stance.
The tool focuses on identity authentication and device security, two critical components of a zero trust architecture.
Zero trust security is becoming increasingly important as organizations seek to mitigate digital threats and strengthen their defenses. [ more ]
Dark Reading
10 months ago
Privacy professionals

Beyond Identity Releases New Assessment to Guide Companies Toward Zero Trust

Beyond Identity has released a free Identity and Device Zero Trust Assessment tool to help organizations evaluate their zero trust security stance.
The tool focuses on identity authentication and device security, two critical components of a zero trust architecture.
Zero trust security is becoming increasingly important as organizations seek to mitigate digital threats and strengthen their defenses. [ more ]
Dark Reading
10 months ago
Privacy professionals

Beyond Identity Releases New Assessment to Guide Companies Toward Zero Trust

Beyond Identity has released a free Identity and Device Zero Trust Assessment tool to help organizations evaluate their zero trust security stance.
The tool focuses on identity authentication and device security, two critical components of a zero trust architecture.
Zero trust security is becoming increasingly important as organizations seek to mitigate digital threats and strengthen their defenses. [ more ]
Dark Reading
10 months ago
Privacy professionals

Beyond Identity Releases New Assessment to Guide Companies Toward Zero Trust

Beyond Identity has released a free Identity and Device Zero Trust Assessment tool to help organizations evaluate their zero trust security stance.
The tool focuses on identity authentication and device security, two critical components of a zero trust architecture.
Zero trust security is becoming increasingly important as organizations seek to mitigate digital threats and strengthen their defenses. [ more ]
morezero trust
Hackernoon
1 year ago
Information security

How Startups Can Bolster Defenses as Cyber Threats Loom in Cloud Era | HackerNoon

Cloud security requires continuous vigilance, even for small startups. [ more ]
[ Load more ]