News, articles, and everything that goes on at Northern.tech!

The Northern.tech blog

pass oldest
I and my colleagues at Northern.tech use pass to store and share passwords in a secure way. Pass uses git and gpg to secure and keep track of changes. Each password is just a gpg file in a special directory, by default ~/.password-store.
I wanted to help myself automate and refres...
The European Telecommunications Standards Institute (ETSI) recently released Technical Specification 103 645, seeking to help protect consumers from IoT devices. Supported by world-class brands like ABB, Canon, Ericsson, Mitsubishi and LG Electronics can we expect this to be a first step in making IoT more secure?
"Cyberthreats continue to impose an ever-bigger danger across the fabric of our society. Governments around the world are waking up to this harsh reality and, as with global warming, this can best be dealt with at an international level.”
In the latest TechTarget IoT Agenda post, our own Thomas...
Today’s approach to securing IT infrastructure is passé. In a dynamic world of unpredictable and often frequent infrastructure changes, the traditional approach to security falls short. It is no longer sufficient to just scan frequently for vulnerabilities and then try to interpret this data in real...
- «
- »