ELIoT Pro expert White Paper Series Part 2: Titanium 2.0
Published May 13, 2020
In the second whitepaper of our 4-part series we explore Machine-to-Machine (M2M) authentication, including the problems associated with designing cyber security solution for IoT devices. Explore our solution based on our proprietary Lightweight Encryption methodology. Internet of things, source of danger? The term “Internet of Things” (IoT) was coined in the late 1990s by an entrepreneur
MoreELIoT Pro: Does the complexity equals security? No!|#10
Published May 11, 2020
Why cyber security has to be easy to use? Complex and long passwords do not appeal to people since they are difficult to remember. Such systems burdened with challenging security mechanisms are less likely to be used by users. Bad password habits Users are accumulating more and more passwords, and many of the recent breaches
MoreELIoT Pro: an adaptable cyber solution for different IoT sectors | #9
Published May 8, 2020
As one of the examples of ELIoT Pro’s applications in different industries, Jack Wolosewicz presents the use case of securing smart homes and connected cars. In both of these examples we encounter the problem of cyber security, however, it’s a way different issue. How easy is it to steal your car? Today there is a
MoreELIoT Pro reaching another significant milestone and demonstrates its potential for Smart City and Industry 4.0 use cases.
Published May 7, 2020
Press release Katowice, May 7th, 2020 Cyberus Labs has completed another deliverable due as part of the European Commission’s SME Instrument /Horizon 2020 programme, which demonstrates ELIoT Pro’s potential for the Smart City and Industrial IoT. In the task focused on “Implementation of the ELIoT Pro Lightweight Encryption technology for Human-to-Machine and Machine-to-Machine authentication and
MoreELIoT Pro Whitepaper Series Part 1: Broken system
Published May 6, 2020
We introduce the first of the four parts of the whitepaper presenting our solution – ELIoT Pro. In part 1 of the ELIoT Pro Whitepaper Series, we talk about the issues associated with using password-based credentials for Human-to-Machine (H2M) authentication and the move into the post-credentials era. We are not safe – the curse of
MoreKnow Identity Forum – digital
Published May 5, 2020
Today, Cyberus Labs’s CEO & CTO Jack Wolosewicz will take part – as a special guest – in the online edition of the international Know Identity Forum digital organised by One World Identity. At today’s session at 7 p.m. CET dedicated to the Smart Healthcare, Jack Wolosewicz will be presenting smart cybersecurity solution in the service of the medical industry. One of the most important challenges of today’s smart world
MoreOur cybersecurity solution – ELIoT Pro |From Enigma to IoT #8
Published May 4, 2020
In this episode, Jack Wolosewicz explains what is ELIoT Pro. ELIoT Pro, on the hand, stands for Easy Lightweight IoT Protection that as one of its components uses password-less Human-to-Machine authentication, based on the original Cyberus Key technology. Cyber security is obviously of paramount importance nowadays since recently attacked branches include among others: Industry 4.0,
MoreCreating an immune system of IoT| From Enigma to IoT Ep #7
Published April 30, 2020
In this episode, we find out about Jack Wolosewicz’s, CEO & CTO, Co-Founder, first foray into cybersecurity. It dates back to the late 90s while working on protecting rights to the music files on the web. Initially, it was all about tracking music on the web and developing a system which is known as ‘digital rights
MoreIn the service of Healthcare
Published April 28, 2020
On May 5th, Cyberus Labs’s CEO & CTO Jack Wolosewicz will feature as a special guest of the international Know Identity Forum digital organised by One World Identity. Jack Wolosewicz will be a guest of the seminar dedicated to the Smart Healthcare and will present our ELIoT Pro, smart cybersecurity solution in the service of the medical industry. It will present the
MoreUsing phone to authenticate users – the most secure mechanism commonly available to humans today |From Enigma to IoT #6
Published April 27, 2020
A cell phone, equipped with the right authentication mechanism, is way better than a password. Stolen passwords and credentials became a plague of the digital world in which we live. In ELIoT Pro we use a cell phone as a universal tool in Human-to-Machine authentication. Moreover, biometric technologies, available in the phones is used as
More