Certificate Housekeeping

Nearly every application software brings a number of certificates with it. If you ask long-term IT security experts, they typically estimate that between 30 to 3,000 certificates are installed on any given PC. In reality a standard Windows 8.1 system easily has 30,000 and more certificates. MacOS 10.6 contains 2,000 certificates. Even on a Linux system (e.g. UBUNTU 14) there are 800 certificates. Unfortunately, lots of these certificates are outdated, are provided by untrustworthy issuers or use weak cryptography. Some certificates were generated a decade…

Securing your Quantified Self

One can look at the Internet of Things in a way where sensors are embedded in the physical world, e.g. plant sites, offices, homes or humans. Sensors embedded in the physical world of  humans are also known as wearables. Wearables such as fitness trackers and the like are an important component of the Quantified Self . But wearables are more; they also include  items like smart watches and smart eyewear. Gartner expects a strong growth in the wearable market in 2015, rising 38% from 2014.

The Weakest Link in Security: The Individual

Many industrial companies have a general rule like: all information that one can obtain during work or for work is confidential or highly confidential unless that information has been published by the communication department to the outside world. It should be every employee’s concern to protect the company’s confidential and sensitive information, this includes technology, know-how, strategy and intellectual property.

5 Things every Board Member Should Know about Identity and Access Management (IAM)

Cloud data storage, multiple business applications, BYOD, home office – Applying appropriate and sufficient controls for managing user accounts and access rights address one of the most significant challenges in today’s enterprise’s IT environment. Intentional or accidental misuse of IT driven business processes by (formerly) authorized users may have a severe impact on the enterprise and its competitive position. As we have pointed out before on this blog, insiders continue to be a major source of data breaches. The following two examples illustrate an organization’s…

Digitalization of Critical Public Infrastructure – is There More to it Than Security Threats?

Digitalization of assets in Critical Public Infrastructure (CPI) such as energy, rail, roads and water supply is increasing at an ever increasing pace, with hundreds of millions of additional sensors and intelligent components being installed additionally every year around the globe. In the next years the proliferation of digital components in physical assets will create an amount of “IT elements and networks” that goes well beyond the currently installed private and business IT. Looking at this development in those infrastructure areas that are crucial for…

Copyright 2015 21st CENTURY IT · RSS Feed · Anmelden