SecureG Media

IOT, PKI, Supply Chain, and Supply Chain Traceability

NTIA Awards SecureG $6M to Ensure Integrity and Interoperability of Open Radio Access Networks (O-RAN)

Featured, PKI, Post Quantum Cryptography, and Zero Trust

Whitehouse Report on Post Quantum Cryptography

Ensuring Critical Infrastructure Security with Quantum-Resistant Cryptography. Federal agencies and critical infrastructure must urgently prepare for the next frontier in cybersecurity: quantum-resistant cryptographic systems (PQC).

BCID and Featured

Branded Calling ID: Restoring Trust in Voice Calls

The simple act of answering a phone call has become a gamble. With the surge in spam, robocalls, and voice phishing (vishing), consumers are increasingly hesitant to pick up calls from unknown numbers.

5G, Featured, and PKI

Securing the Future: Digital Certificates in 5g Networks

Here we explore the crucial role of digital certificates in securing modern networks and discuss five intriguing points about their applications.

5G and PKI

Digital Certificates Enable Branded Caller ID

Unwanted robocalls have made consumers reluctant to answer the telephone, and legitimate enterprises have been struggling…

IOT and PKI

The Importance of Digital Certificates in IoT Security

The Internet of Things (IoT) has revolutionized industries and transformed the way we interact with technology. From smart homes…

IOT, PKI, and Root of Trust

The Role of Silicon Root of Trust and PKI in IoT Security

The Internet of Things (IoT) is rapidly expanding, with billions of devices connected to the internet. While this connectivity…

PKI and Root of Trust

Comparing Silicon Root of Trust and PKI with Other Security Technologies

Security is a critical concern for organizations of all types and sizes. As technology continues to evolve, so too do the security threats that organizations face.

IOT, PKI, and Root of Trust

Best Practices for Implementing Silicon Root of Trust and PKI

Silicon Root of Trust (RoT) and Public Key Infrastructure (PKI) are essential technologies for ensuring the security of devices and networks. When building a public key infrastructure (PKI) technology

PKI and Root of Trust

Introduction to Silicon Root of Trust and PKI

Silicon Root of Trust (RoT) and Public Key Infrastructure (PKI) work together to provide a secure computing environment. The Silicon RoT is a hardware-based security mechanism that ensures the integrity

Operational Technology and PKI

PKI for Operational Technology Needs a Special Approach

SecureG delivers a customer-specific private PKI system that integrates with Operational Technology (OT) systems, securing the environment by putting identity-based security in every node.

Operational Technology and PKI

Addressing Customer Demand for OT Security

Industrial customers are demanding security solutions from their Operational Technology (OT) vendors due to the increasing number of security breaches and the risks associated with them.

Operational Technology and PKI

PKI for Securing OT Environments

Operational Technology (OT) is increasingly interconnected with information technology (IT) systems, expanding the attack surface.

Operational Technology and PKI

The Risks of Industrial Cybersecurity Threats

Industrial cybersecurity threats are becoming increasingly common and can have a significant financial and reputational impact on businesses.

IOT, Supply Chain, and Zero Trust

Suspicious SBOM Construction for Secure Software Development

Open-source software has become an integral part of many organizations’ software development processes due to its cost-effectiveness and flexibility.

Supply Chain and Zero Trust

How SBOM Tools Can Help Mitigate Software Supply Chain Risk

A recent article on The Hill highlights the growing concern over software supply chain risk and the potential solutions available.

Featured and Supply Chain

Securing the software supply chain for Government

In Biden’s Executive Order on Improving the Nation’s Cybersecurity, mandates for the security of the software supply chain were explicitly laid out.

Cloud and PKI

The strengths and weaknesses of kubernetes security

According to a Sentinel One article, “96% of organizations surveyed by CNCF (Cloud Native Computing Foundation) were either using or evaluating Kubernetes” in 2021.

Cloud and PKI

ZTA & identity management with Kubernetes

In this digital age, organizations are increasingly adopting cloud-native technologies such as Kubernetes to manage their infrastructure and applications.

Cloud and PKI

The Kubernetes bandwagon—is it safe to jump on?

Jump on the bandwagon, but watch your step

PKI

More chips, more security

While U.S. chip investment may create opportunity, this opportunity must be protected

IOT and Zero Trust

Drones Gone Wild

The stakes are sky high—how are you protecting your IoT fleet?

IOT and PKI

Combatting malware in IoT

To combat malware, IoT designers should build a bit more basic security into their devices before releasing them into the wild

Pin It on Pinterest