WISeKey’s Global Cybersecurity to Protect People’s Privacy and Critical Infrastructures

WISeKey International Holding Ltd. (“WISeKey”) (SIX: WIHN, NASDAQ: WKEY), a leading global cybersecurity and IoT company, announced today the release of a consistent cybersecurity combined offer to secure access to connected objects. This solution sits on WISeKey’s three fundamental value propositions: the new WISeID™ digital identity ecosystem for people, VaultIC407 secure element and VaultiTrust™ for electronic credentials generation, insertion and management. In its 2019 Cyber Threat Report, SonicWall announced a significant escalation of IoT attacks, with a 217.5% increase from 2017. Even more frighteningly, the same study revealed that 3.9 trillion intrusion attempts were recorded. Massive published cyberattacks, such as the Ring’s case, are just the tip of the iceberg. Connected objects allow the implementation of many disruptive applications, at risk whenever the access to these devices and the related data (private video as an example) is not properly protected. Passwords have to be properly generated and managed. Two-factor authentication (reception of a confirmation code on a smartphone, for instance) is a plus. But data are at stake when they are conveyed from device-to-cloud as illustrated by the following picture

Spotlight

The DORA report helps tech companies and startups understand DevOps practices that drive successful software delivery and operational performance, how their organization compares to others based on key metrics, how cultural changes can improve supply chain security, and why high-trust and low-blame cultures have higher organizat


Other News

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Spotlight

The DORA report helps tech companies and startups understand DevOps practices that drive successful software delivery and operational performance, how their organization compares to others based on key metrics, how cultural changes can improve supply chain security, and why high-trust and low-blame cultures have higher organizat

Resources