HomePlatformSecurity

Security

Unwrapping Certificates

Certificates are the most secure way to connect your device to the cloud. This article reduces confusion surrounding them with simple examples.

A Device That Can’t Be Updated Is a Device That Can’t Be Trusted

Over-the-air updates are a crucial part of building and deploying secured devices, yet many product companies skip this step. This post outlines why it's difficult and how Golioth is making it easier.

How to Provision and Store IoT Device Certificates

Every IoT device should operate over an encrypted channel. But how exactly does that security work as...

Golioth Certificate-Based Authentication

Certificates ensure secure connection between device and cloud, from provisioning until decommissioning. Today we are announcing the ability to use Certificates with the Golioth platform.

Why use certificates for Internet of Things authentication (DTLS)

How can security improve when manufacturing large volumes of devices? That's the question I ended on in...

Yes, even your IoT prototype should be secure

Vit Prajzler, CTO of Golioth, explains the concept of a Pre-Shared Key (PSK) and how it lends a simple but flexible amount of security for prototypes on the Golioth network. IoT prototypes on the Golioth platform are "Secure by default".

Want to stay up to date with the latest news?

We would love to hear from you! Please fill in your details and we will stay in touch. It's that simple!