Search results for: zero trust
OT Security: Cybersecurity for Modbus
OT Security: Cybersecurity for Modbus Modbus Overview   The Modbus protocol, a cornerstone of industrial control systems (ICS), has long served as a fundamental means for communication in critical infrastructure environments, such as manufacturing, energy, and water treatment. However, the growing interconnectivity of these systems with the broader IT landscape and the evolving threat landscape…
Read MoreCybersecurity threats to hospitals and healthcare facility building management systems
A recent cyberattack forced a healthcare organization to cancel non-emergency surgeries and send some emergency patients to other facilities. In another attack, a hospital took it’s critical systems offline, impacting patient safety, requiring less efficient care methods, which also increased labor demands. It’s still impacted two years later. Cyberattacks on hospital and healthcare facilities increased…
Read MoreDOME IoT Device Ownership
DOMETM: Device OwnershipManagement and EnrollmentTM IoT Device Ownership Management and Security Made Simple Everyday there are millions of devices that enter the IoT that contain a processor that must be maintained, monitored and securely managed. Not every processor can connect to a cloud or network service and many are without a user interface which…
Read MoreAnatomy of a Data Breach
What are They and What to do When You Spot One? Arguably no phrase has dominated the tech world the last 24 months more than the term “data breach.” From breaches that have impacted critical infrastructure like the Colonial Pipeline to hackers compromising healthcare records at UC San Diego Health, the last two years have…
Read MoreCybersecurity for Systems Integrators
Building & Facility Cybersecurity for BAS/BMS Systems Integrators Building Automation and Smart BuildingCybersecurity Solutions for Systems Integrators Help Your Customers Make Their Building Control Systems and Smart Buildings Cyber-Safe with an Easy Retrofit Solution that Delivers Recurring Revenue Veridify’s DOME™ solution provides scalable cybersecurity protection that is easily retrofitted to existing networks, delivering a cost-effective…
Read MoreFrom PSA Certified: Six IoT Security Features for Smart Building Devices
In an article published at PSA Certified, Veridify CEO Louis Parks details six IoT security features that every smart building device OEM should consider to protect their devices from cyberattacks. Article Summary: The capabilities outlined below reflect industry best practice and are included in the PSA Certified 10 Security Goals, a key part of the…
Read MoreVeridify DOME™ and Complying with US Federal IoT Cybersecurity Law
In December 2020, as the 116th Session neared its end, Congress passed H.R. 1668, the Internet of Things Cybersecurity Improvement Act of 2020, and the President signed it into law, Public Law 106-207 [Law]. The act’s primary objective is to establish minimum security standards for IoT devices owned or controlled by the Federal Government. It…
Read MoreVeridify Security’s DOME™ Client Library Achieves PSA Certified Level 1 Accreditation
Shelton, CT – May 6, 2020 – Veridify Security Inc., a leader in securing low-resource devices at the edge of the IoT, announced today that its DOME Client, running on the STMicroelectronics’ PSA Certified STM32L5 MCU and leveraging the PSA Functional Cryptography API, has achieved PSA Certified Level 1 security certification. DOME Client, part of…
Read MoreEmployment
Employment / Open Positions Veridify Security Inc. is pioneering IoT cybersecurity solutions with an emphasis on industrial controls and building automation. We partner with the world’s leading semiconductor and cloud vendors to provide device-to-device security featuring zero-trust communication security, zero-touch deployment, blockchain credential management, and authentication and data protection between all IoT devices. The market…
Read MoreIoT Security News — Issues with Authentication and Open Ports
When it comes to the IoT, it is essential to incorporate security into the products during the design phase and anticipate the need to react to new threats. IoT security is an ever-evolving challenge. The news items below about IoT security breaches show that attackers and security experts continue to find new vulnerabilities, often in devices…
Read More