Stay up to date with the latest news, opinions and free resources from Device Authority.
From company announcements, expert opinion on the latest IoT security issues or helpful guides to support your own organization, use our filters below to find the resources most useful for you.
As digital transformation accelerates, so do the cybersecurity risks, particularly for organisations handling critical infrastructure and sensitive data. To address these challenges, the European Union has updated its cybersecurity regulations with NIS2 (Network and Information Security Directive 2), expanding and strengthening the original NIS Directive, which was established to improve cybersecurity across essential sectors. As the deadline for NIS2 compliance is upon us, let’s take stock of its implications and how to ensure its benefits continue long into the future.
Landmark milestone for Microsoft’s Rising Azure Technology 2023 Microsoft Partner of the Year Award winner, highlights growth and innovation in global IoT and AI security
In recent years, critical infrastructure (CI) has become a primary target for cybercriminals and nation-state actors. The systems that provide essential services such as energy, water, transportation, and healthcare are increasingly vulnerable to attacks that could have devastating consequences for entire regions or even nations. As well as the recent attack on American Water, one of the most notable incidents was the Colonial Pipeline attack in 2021, which disrupted fuel supplies across the East Coast of the United States, highlighting the fragility of CI in the face of sophisticated cyber threats.
The alarming rise in OT cyber-attacks on America’s critical infrastructure has highlighted the urgent need to prioritize investment in defending against OT-specific cyber threats. Oil and Gas, Utilities, and other critical infrastructure companies must reassess their approach to cybersecurity and mitigate attacks across converged systems. Investing in advanced threat detection, employee training to raise cyber risk awareness, and incident response capability has become more urgent than ever before.
1 event, 3 theatres
In today’s hyperconnected world, the proliferation of Internet of Things (IoT) and Operational Technology (OT) devices has dramatically transformed industries, driving innovation, efficiency, and automation. However, as organizations continue to adopt these devices, the security landscape has become increasingly complex. Traditional IT security measures often fall short of safeguarding these critical assets, leaving them vulnerable to cyber threats. Recognizing this challenge, a CyberArk, the leading identity security company and Device Authority, a leader in IoT security have joined forces in a strategic partnership aimed at extending privileged access credentials to IoT and OT devices, ensuring comprehensive protection for these critical systems.
Our ongoing growth in North America is continuing at pace, securing three new enterprise customers from our key sectors.
Privilege Access Management (PAM) controls access to privileged accounts, a key step in securing sensitive data and systems. Discover what PAM is, why you need it, and how to implement it effectively.