SecureG (@secure_g1) 's Twitter Profile
SecureG

@secure_g1

SecureG: Cloud-native PKI for Zero Trust machine communications

ID: 1536765193887395841

linkhttps://secureg.io/ calendar_today14-06-2022 17:40:10

64 Tweet

7 Followers

17 Following

SecureG (@secure_g1) 's Twitter Profile Photo

SecureG is committed to providing our partners the best way to enable secure machine identity. Head over to the SecureG YouTube channel to hear CISO James Gorman James Gorman share how our services are built to do just that. youtube.com/watch?v=Eb6VNC…

SecureG (@secure_g1) 's Twitter Profile Photo

With the the continuous innovation within IoT, securing machine identities is more crucial than ever. Read this IoT World Today article to find out how the White House plans to secure IoT products with a new labelling system. #IoT #machineidentities tinyurl.com/y948jtnm

With the the continuous innovation within IoT, securing machine identities is more crucial than ever.

Read this <a href="/IoTWorldToday/">IoT World Today</a> article to find out how the White House plans to secure IoT products with a new labelling system. 

#IoT #machineidentities

tinyurl.com/y948jtnm
SecureG (@secure_g1) 's Twitter Profile Photo

SecureG has joined forces with @attcyber, T-Mobile, and UScellular; industry partners Ericsson, CTIA, and MITRE; and academic partner the University of Maryland through The 5G Security Test Bed project. Head over to our blog to find out more. tinyurl.com/3vzxudpy

SecureG (@secure_g1) 's Twitter Profile Photo

How can you make sure all of the smart devices on your networks are who they say they are? In this video, SecureG CISO James Gorman (James Gorman) discusses the danger of trusting IoT devices in a non-ZTA scenario. youtube.com/watch?v=Qaf6ld…

Science Animated (@sci_ani) 's Twitter Profile Photo

This animation defines PKI, #PKI as a service (PKIaas), how PKI has been used in the past to secure #digital systems and hints at the SecureG next-generation PKI to protect #systems at scale. Watch now: youtube.com/watch?v=d-id86…

SecureG (@secure_g1) 's Twitter Profile Photo

In this video, SecureG advisor Russ Housley asserts the importance of securing machine identities within the IoT space. youtube.com/watch?v=J_BECa… #IoT #NetworkSecurity #criticalinfrastructure

SecureG (@secure_g1) 's Twitter Profile Photo

SecureG's contribution to securing smart vehicles starts with building digital identity into the supply chain, components, and vehicles. Read this article from IoT World Today to learn the latest. tinyurl.com/3kpb76tx

SecureG's contribution to securing smart vehicles starts with building digital identity into the supply chain, components, and vehicles.

Read this article from IoT World Today to learn the latest.

tinyurl.com/3kpb76tx
SecureG (@secure_g1) 's Twitter Profile Photo

SecureG CTO Dr. Bill Anderson describes the current status of machine-to-machine authentication technology. youtube.com/watch?v=pHoEWm… SecureG's technology addresses the need to refresh, renew, and revoke certificates quickly for IoT devices. #autonomousvehicles #machineidentity

SecureG (@secure_g1) 's Twitter Profile Photo

Going to DoDIIS Worldwide Conference December 12-15? SecureG VP Business Development Jim Payne will be at the conference at Booth 455. Stop by to say hi and learn more about SecureG's solutions. See you there! #DoDIIS #DoDIIS2022

Going to DoDIIS Worldwide Conference December 12-15?

SecureG VP Business Development Jim Payne will be at the conference at Booth 455. Stop by to say hi and learn more about SecureG's solutions.

See you there!

#DoDIIS #DoDIIS2022
SecureG (@secure_g1) 's Twitter Profile Photo

This @Nextgov article discusses how the National Institute of Standards and Technology has highlighted how IoT security goes beyond the device manufacturer. SecureG supports the establishment of critical roles that cloud services and other infrastructure providers perform. Learn more below. tinyurl.com/mpn7jhuz

This @Nextgov article discusses how the <a href="/NIST/">National Institute of Standards and Technology</a> has highlighted how IoT security goes beyond the device manufacturer. SecureG supports the establishment of critical roles that cloud services and other infrastructure providers perform.

Learn more below.
tinyurl.com/mpn7jhuz
SecureG (@secure_g1) 's Twitter Profile Photo

Traditional PKI allows human identities to be verified on different ends of a network, but what happens when you need to verify that your IoT devices are who they say they are? Watch this video with James Gorman to learn more. tinyurl.com/4m794wam

SecureG (@secure_g1) 's Twitter Profile Photo

Ever wonder how we keep our technology secure? Head over to the SecureG blog to learn the lengths we've gone to help customers create, manage, and protect the most vital part of their digital trust infrastructure – their private root keys. secureg.io/tour-the-trust…

Ever wonder how we keep our technology secure?

Head over to the SecureG blog to learn the lengths we've gone to help customers create, manage, and protect the most vital part of their digital trust infrastructure – their private root keys.

secureg.io/tour-the-trust…
SecureG (@secure_g1) 's Twitter Profile Photo

Attending DoDIIS Worldwide Conference in San Antonio? SecureG VP Business Development Jim Payne will be attending the conference until the 15th. Stop and say hello and learn more about SecureG's solutions. #SecureGSighting #DoDIIS #DoDIIS2022

Attending DoDIIS Worldwide Conference in San Antonio?

SecureG VP Business Development Jim Payne will be attending the conference until the 15th. Stop and say hello and learn more about SecureG's solutions.

#SecureGSighting #DoDIIS #DoDIIS2022
SecureG (@secure_g1) 's Twitter Profile Photo

SecureG CEO Mike Denning discusses his industry experience in this episode of Conversations with Chief Innovators. We're proud to have him on our team, leading the charge to secure critical infrastructure with certificate-based security. lnkd.in/gbQtkrNX #leadership #CEO

Modus Create, Inc. (@moduscreate) 's Twitter Profile Photo

Mike Denning, CEO of SecureG and a principal at Blu Venture Investors shares his thoughts on #innovation and #cybersecurity with sheridap in the latest episode of #ConversationsWithChiefInnovators. 👇 mdus.co/3UYg6d5

Mike Denning, CEO of <a href="/Secure_G1/">SecureG</a> and a principal at <a href="/Blu_Venture/">Blu Venture Investors</a> shares his thoughts on #innovation and #cybersecurity with <a href="/sheridap/">sheridap</a> in the latest episode of #ConversationsWithChiefInnovators. 👇

mdus.co/3UYg6d5
SecureG (@secure_g1) 's Twitter Profile Photo

Yesterday, SecureG CISO James Gorman shared information on how to stay hack free in 2023 at an event hosted by ATARC, Loudoun Economic Development, and Rhythmic Technologies, Inc. James' expertise on how to keep networks safe is an invaluable asset to our work at SecureG.

Yesterday, SecureG CISO <a href="/jgorman165/">James Gorman</a> shared information on how to stay hack free in 2023 at an event hosted by ATARC, Loudoun Economic Development, and Rhythmic Technologies, Inc.  

James' expertise on how to keep networks safe is an invaluable asset to our work at SecureG.
SecureG (@secure_g1) 's Twitter Profile Photo

A CNN Business article reported that TSMC is upping their chip investment in AZ to $40B. tinyurl.com/2pzx7bwz The #CHIPSandScienceAct asserts the need to secure this innovation, starting with a root of trust that enables secure provisioning, management, & security updates.

A <a href="/CNNBusiness/">CNN Business</a> article reported that TSMC is upping their chip investment in AZ to $40B. 

tinyurl.com/2pzx7bwz

The #CHIPSandScienceAct asserts the need to secure this innovation, starting with a root of trust that enables secure provisioning, management, &amp; security updates.
Science Animated (@sci_ani) 's Twitter Profile Photo

.SecureG's PKIaas solution is focused on securing the #communications of #smartwarehouses. Allowing partners to confidently manage the supply chains with a warehouse's #5G network. youtube.com/watch?v=0bT7eT…

SecureG (@secure_g1) 's Twitter Profile Photo

Kubernetes—you know everyone else is doing it, right? However, with great popularity can also bring great vulnerability. This SecureG blog post dives into how enterprises from all sectors can utilize Kubernetes securely. secureg.io/the-kubernetes…

Kubernetes—you know everyone else is doing it, right?

However, with great popularity can also bring great vulnerability. 

This SecureG blog post dives into how enterprises from all sectors can utilize Kubernetes securely.

secureg.io/the-kubernetes…
SecureG (@secure_g1) 's Twitter Profile Photo

How did Mike Denning join us here at SecureG? Read our latest blog post to learn more about SecureG's seasoned CEO. secureg.io/mike-denning-h…

How did Mike Denning join us here at SecureG?

Read our latest blog post to learn more about SecureG's seasoned CEO.

secureg.io/mike-denning-h…