Zero-Trust IoT Security for Smart Cities

Zero-Trust IoT Security for Smart Cities

Executive Summary This white paper presents a comprehensive guide to implementing zero-trust security in smart city IoT deployments. With thousands of interconnected devices such as street-light controllers, gateways, and cloud platforms, the attack surface...
EMV(TM) Application Selection

EMV(TM) Application Selection

Dear Readers, In order to support the multiapplication business requirement, the terminal should implement appropriate procedures for card application selection. To this end the acquirer that manages the terminal shall maintain a list of the card applications...
Getting an accurate biometric security key

Getting an accurate biometric security key

Dear Readers, Passwords have shown to be untrustworthy for safeguarding our internet accounts in today’s digital world. As a result, biometric security keys are becoming increasingly popular as a more secure alternative to standard passwords. To validate user...
Hardware Security Module (HSM)

Hardware Security Module (HSM)

Dear Readers, What is a Hardware Security Module (HSM)? Hardware security modules (HSMs) are hardened, tamper-resistant hardware devices that secure cryptographic processes by generating, protecting, and managing keys used for encrypting and decrypting data and...
How can water utilities be protected against cybercrime?

How can water utilities be protected against cybercrime?

Dear Readers, Water utilities are vital community services that supply safe drinking water and wastewater treatment. They are, nevertheless, vulnerable to cybercrime, just like any other essential infrastructure. Hackers might compromise the water utility’s network...