all InfoSec news
A Case for Practical Configuration Management Using Hardware-based Security Tokens. (arXiv:2205.12757v1 [cs.CR])
cs.CR updates on arXiv.org arxiv.org
Future industrial networks will consist of a complex mixture of new and
legacy components, while new use cases and applications envisioned by Industry
4.0 will demand increased flexibility and dynamics from these networks.
Industrial security gateways will become an important building block to tackle
new security requirements demanded by these changes. Their introduction will
further increase the already high complexity of these networks, demanding more
efforts in properly and securely configuring them. Yet, past research showed,
that most operators of …
case configuration configuration management hardware management security tokens