Hi [[ session.user.profile.firstName ]]

DigiCert

  • Date
  • Rating
  • Views
  • What Can be Done to Secure a Connected Vehicle?
    What Can be Done to Secure a Connected Vehicle? Mike Nelson, VP, Critical Infrastructure at DigiCert, Mike Ahmadi, Global Director of Critical Systems Security at Synopsys Recorded: Jun 22 2017 60 mins
    As self-driving vehicles are coming off the production line, automakers are deploying technology to improve the driving experience, from the infotainment system to enhancing brake and fuel efficiency. Yet, adequate cyber security measures still need to catch up. Whether it’s the hacked Jeep or the Nissan Leaf app vulnerability, connected vehicles often fail to implement basic authentication and encryption measures to protect users.

    Mike Nelson and Mike Ahmadi will cover the following topics:

    - Insight into the state of connected vehicle security and the need for interoperable standards-based solutions.
    - How connected device manufacturers are using public key infrastructure (PKI) to provide scalable authentication, encryption and data integrity for the vehicle and its thousands of connected parts.
    - Specific steps security teams can take beginning today.
  • Automated Certificate Provisioning to IoT Devices
    Automated Certificate Provisioning to IoT Devices DigiCert Recorded: Feb 3 2017 5 mins
    Connected device manufacturers and owners need a secure automated method for registering certificates and delivering them to their devices at scale. Too many Internet of Things (IoT) devices support only proprietary device enrollment protocols that are not compatible with digital certificates. As these connected devices lack the compute power required for strong encryption, when credentials need to be revoked or rotated because of device authorization changes, the process is typically manual, time-consuming and vulnerable to human error. With DigiCert Auto-Provisioning powered by Device Authority, connected device manufacturers and owners can provision digital certificates at scale, whether their devices use open standards such as SCEP or EST, or only support propriety device enrollment protocols.

    In this demonstration, watch as certificates are generated and delivered to connected cameras and watch as a certificate is revoked and a new one issued. Learn how Auto-Provisioning combines scalable certificate issuance with automated provisioning to simplify large-volume device enrollment and credentialing, and how it also provides secure key generation and storage to prevent the use of stolen credentials and unauthorized devices. Auto-Provisioning allows companies to take a major step forward in securing their IoT investments, becoming less dependent on manufacturer security.
  • IoT Security: New Approaches to Authenticating Devices
    IoT Security: New Approaches to Authenticating Devices Dan Timpson, DigiCert Chief Technology Officer and Talbot Harty, Device Authority Chief Technology Officer Recorded: Sep 29 2016 57 mins
    Trusted identity and authentication of connected devices are critical to secure the IoT and prevent compromised enterprise networks. But now, even lightweight devices, such as operational sensors and other nodes, can be protected with scalable credential provisioning and management.

    Learn more from IoT security experts as they discuss the challenges most organizations face and what you can do to protect your company’s valuable IoT investments. You can also view a demo on a joint solution for credential provisioning and management.
  • Get Smart: Using PKI to Secure the IoT
    Get Smart: Using PKI to Secure the IoT Jason Sabin, DigiCert CSO and Brian Russell, Leidos Chief Engineer Recorded: May 24 2016 92 mins
    This webinar discusses how the Internet of Things is using PKI to address IoT authentication challenges. Discover innovative new methods for using PKI to tackle the unique scalability, privacy, and compute constraints of the IoT.

    Common use cases demonstrate how digital certificate deployment is used for secure key management as well as to enable trusted device enrollment, authenticated device updates, and more. PKI plays plays a ke in providing reliable identity assurance and encryption for billions of endpoints (e.g. devices and servers) for connected healthcare, automobiles, manufacturing, industrial operations, smart homes and cities, and so much more.

Embed in website or blog