Stay up to date with the latest news, opinions and free resources from Device Authority.
From company announcements, expert opinion on the latest IoT security issues or helpful guides to support your own organization, use our filters below to find the resources most useful for you.
CyberArk IMPACT World Tour is your passport to the latest advancements in identity security and a chance to connect with top experts and organizations dedicated to making the digital world safer for all. Taking place in more than more than 20 cities around the world, IMPACT World Tour will feature curated content and sessions most relevant to your geography, along with local customer and industry speakers. Join us at a city near you!
CyberArk IMPACT World Tour is your passport to the latest advancements in identity security and a chance to connect with top experts and organizations dedicated to making the digital world safer for all. Taking place in more than more than 20 cities around the world, IMPACT World Tour will feature curated content and sessions most relevant to your geography, along with local customer and industry speakers. Join us at a city near you!
NEWTON, Mass. & PETACH TIKVA, Israel – March 10, 2024 – CyberArk (NASDAQ: CYBR) and Device Authority, in collaboration with Microsoft, have launched a solution that strengthens and scales connected device authentication to enterprise applications with Zero Trust principles. It helps manufacturers reduce cyber risk from connected devices in factory floors and edge environments with robust identity security, automated access management and device lifecycle protection.
The recent emergence of the Eleven11bot botnet which has compromised over 86,000 Internet of Things (IoT) devices, underscores the critical vulnerabilities inherent in unmanaged IoT ecosystems. This botnet, reported by The Shadowserver Foundation, primarily targets devices such as security cameras and network video recorders, leveraging them to execute large-scale DDoS attacks against sectors including telecommunications and online gaming platforms.
New tool will simplify the process of discovering every unmanaged device on a network, highlighting vulnerabilities and improving asset security
Continuous monitoring helps organisations to detect and respond to threats in real-time. It’s crucial for protecting against data breaches and ensuring system integrity. This article explains what continuous monitoring is, it’s importance and features, and best practices of continuous monitoring to strengthen your cybersecurity.
Network micro-segmentation is a cybersecurity strategy that divides your network into smaller segments to better manage and secure network traffic. This approach helps prevent unauthorised access and limits the spread of threats within the network.
The Zero Trust Security Framework is a fundamental approach to digital security. It assumes that every user and device is untrusted, requiring continuous authentication. This model helps to protect against the growing number of cyber threats. In this article, we discuss its principles, benefits, and real-world applications.