-
Whitepaper Aug 08, 2019
The Sectigo IoT Platform removes the complexity of PKI, allowing manufactures to easily, and cost effectively authenticate and protect connected devices.
-
Webinar Aug 08, 2019
Root Causes Webinar: Securing a World of Interconnected Devices
Learn how PKI and device hardening technologies are the answer to secure your IoT devices for enterprise and critical infrastructure.
-
Podcast Jul 24, 2019
Root Causes 29: Vulnerabilities in Cisco and Device Integrity Controls
Our hosts and guest Alan Grau discuss what is happening with security flaws in the device integrity modules various devices, why, and what to do about it.
-
Press Release Jul 18, 2019
Sectigo Partners with NetObjex to Protect the Edge of IoT
Sectigo announced a secure edge computing technology pact with NetObjex, an Intelligent Automation Platform for tracking, tracing, and monitoring digital assets using AI, Blockchain, and IoT. The collaboration provides enterprises and manufacturers with a secured, trusted computing infrastructure that extends from IoT edge devices to the cloud and blockchain.
-
News Article Jul 18, 2019
Sectigo has entered into a secure edge computing technology pact with NetObjex — an intelligent automation platform for tracking, tracing and monitoring digital assets using AI, blockchain, and IoT. The collaboration hopes to provide enterprises and manufacturers with a secured, trusted computing infrastructure.
-
Press Release Jul 10, 2019
Jason Soroko to Speak on IoT Security Panel at Black Hat
On August 7, 2019, Jason Soroko will participate on a panel at Black Hat USA 2019. The interactive panel, “IoT Security in 2019: Risks and Cyber Resilience,” will feature best strategies from industry experts for achieving security at every level.
-
News Article Jul 09, 2019
There have been a few real-world cases where white-hat hackers and researchers have been able – in limited, controlled instances – to penetrate a car’s electronics and communications systems, take over its steering and acceleration systems, and potentially do real damage.
-
Blog Post Jul 07, 2019
Bad Cars: Anatomy of a Ransomware Attack
Suppose cyber hackers successfully penetrated and infected critical components in a manufacturer's vehicles? Imagine now that the bad guys had the software or security keys that could fix these problems, but hold them as ransom, jeopardizing an entire fleet of new cars.
-
News Article Jul 02, 2019
Alan Grau, VP of IoT, Embedded Systems (and president & founder of Icon Labs) answers questions about the acquisition, digital certificates, as well as on-premise and cloud-based CAs.
-
News Article Jul 02, 2019
Security has not historically been a core competency of device manufacturers, so the question is, do they learn it and do it themselves or find partnerships with companies like Sectigo? In this Q&A, Sectigo's CTO of IoT, Jason Soroko, discusses the company's acquisition of Icon Labs.
-
Blog Post Jun 27, 2019
IoT botnets and cyberattacks just keep coming. The most recent attack, the Silex botnet, is particularly nasty. It doesn’t use devices to create DDoS attacks or attempt to steal personal data. The malware simply deletes the software from the device rendering it useless, or “bricking” the device. Fortunately, there are ways to prevent these kinds of attacks.
-
Press Release Jun 20, 2019
Sectigo Private PKI enables enterprises to augment or replace their Microsoft Active Directory Services (Microsoft CA) by managing non-Microsoft devices and applications, including mobile, Internet of Things (IoT), email, cloud, and DevOps, all in a single platform—making it the most flexible solution offered by a commercial Certificate Authority.