Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > Entrust Datacard > The Evolution of PKI for IoT Establishing Trust in an Untrusted Environment
 

The Evolution of PKI for IoT Establishing Trust in an Untrusted Environment

White Paper Published By: Entrust Datacard
Entrust Datacard
Published:  Jul 23, 2019
Type:  White Paper
Length:  11 pages

In years past, device functionality was enough to sell most embedded products without much concern for cybersecurity. Of course there were exceptions, such as in critical infrastructure, aviation, and military, for which security was always of importance. But today’s environment has evolved on several fronts. First, organizations across nearly all markets are demanding Internet connectivity to monitor and control devices as well as to aggregate and analyze data. Second, the magnitude of security threats has exploded, driven by highly sophisticated hackers including organized criminal gangs seeking financial returns, creating a constantly evolving threat landscape. Third, the increasingly complex nature of connected systems makes them ever more challenging to protect. The more complex a system, the more potential vulnerabilities it may contain. And fourth, the data generated by connected devices represent an asset that is becoming increasingly valuable for organizations to derive insights about their operations. In addition, an increasing portion of connected systems involve devices that can potentially damage people or physical property if compromised.



Tags :