Cybersecurity is the gateway to future success of IoT | #12

Cybersecurity is the gateway to future success of IoT | #12

Published May 18, 2020

Episode 12 focuses on the very immune system as the heart of any mechanism. Jack Wolosewicz explains that such a system is critical to the survival of any software. The future of the IoT seems to be extremely promising. Therefore it’s of the paramount importance to develop state-of-the-art immune systems. Without such solutions the IoT

More
ELIoT Pro – An immune system for the world of IoT | #11

ELIoT Pro – An immune system for the world of IoT | #11

Published May 15, 2020

This episode starts with a striking comparison of where we are with the Internet and IoT. As they are young organisms, there is a compelling analogy to a human organism – they are vulnerable to various diseases in the early stages of development. That’s why they have to initially develop an immune system. What are

More
ELIoT Pro: Does the complexity equals security? No!|#10

ELIoT Pro: Does the complexity equals security? No!|#10

Published May 11, 2020

Why cyber security has to be easy to use? Complex and long passwords do not appeal to people since they are difficult to remember. Such systems burdened with challenging security mechanisms are less likely to be used by users.  Bad password habits Users are accumulating more and more passwords, and many of the recent breaches

More
ELIoT Pro: an adaptable cyber solution for different IoT sectors | #9

ELIoT Pro: an adaptable cyber solution for different IoT sectors | #9

Published May 8, 2020

As one of the examples of ELIoT Pro’s applications in different industries, Jack Wolosewicz presents the use case of securing smart homes and connected cars. In both of these examples we encounter the problem of cyber security, however, it’s a way different issue. How easy is it to steal your car? Today there is a

More
ELIoT Pro Whitepaper Series Part 1: Broken system

ELIoT Pro Whitepaper Series Part 1: Broken system

Published May 6, 2020

We introduce the first of the four parts of the whitepaper presenting our solution – ELIoT Pro. In part 1 of the ELIoT Pro Whitepaper Series, we talk about the issues associated with using password-based credentials for Human-to-Machine (H2M) authentication and the move into the post-credentials era. We are not safe – the curse of

More
Know Identity Forum – digital

Know Identity Forum – digital

Published May 5, 2020

Today, Cyberus Labs’s CEO & CTO Jack Wolosewicz will take part – as a special guest – in the online  edition of the international Know Identity Forum digital organised by One World Identity. At today’s session at 7 p.m. CET dedicated to the Smart Healthcare, Jack Wolosewicz will be presenting smart cybersecurity solution in the service of the medical industry. One of the most important challenges of today’s smart world

More
Creating an immune system of IoT| From Enigma to IoT Ep #7

Creating an immune system of IoT| From Enigma to IoT Ep #7

Published April 30, 2020

In this episode, we find out about Jack Wolosewicz’s, CEO & CTO, Co-Founder, first foray into cybersecurity. It dates back to the late 90s while working on protecting rights to the music files on the web. Initially, it was all about tracking music on the web and developing a system which is known as ‘digital rights

More
In the service of Healthcare

In the service of Healthcare

Published April 28, 2020

On May 5th, Cyberus Labs’s CEO & CTO Jack Wolosewicz will feature as a special guest of the international Know Identity Forum digital organised by One World Identity. Jack Wolosewicz will be a guest of the seminar dedicated to the Smart Healthcare and will present our ELIoT Pro, smart cybersecurity solution in the service of the medical industry. It will present the

More
Using phone to authenticate users – the most secure mechanism commonly available to humans today |From Enigma to IoT #6

Using phone to authenticate users – the most secure mechanism commonly available to humans today |From Enigma to IoT #6

Published April 27, 2020

A cell phone, equipped with the right authentication mechanism, is way better than a password. Stolen passwords and credentials became a plague of the digital world in which we live. In ELIoT Pro we use a cell phone as a universal tool in Human-to-Machine authentication. Moreover, biometric technologies, available in the phones is used as

More
Security of our One-Time Codes | From Enigma to IoT #5

Security of our One-Time Codes | From Enigma to IoT #5

Published April 24, 2020

In this episode number #5 of the series on IoT security Jack Wolosewicz talks about ELIoT Pro’s security mechanisms that make it impossible to log on, even if somebody hijacks the sonic code, and how we use additional security mechanisms in our Human to Machine authentication component that prevent from impersonating the user. For Cyberus

More