WoTT Security Blog Musings, thoughts, ideas, releases on security
open-source Why open source is critical for InfoSec By Al Esmail on June 24, 2019 TL;DR Proprietary security is a fresh cow pie hiding in the tall grass. Figure 1 - How I imagine decision fatigued CTOs see the world when speaking to proprietary security vendors. Can you spot the cow pie? In a previous post, I advocated for the merits of DevSecOps and shift left security.... Continue reading
Why shift-left security is relevant for IoT By Al Esmail on June 23, 2019 TL;DR Cyber is best handled by developers with big, bulging…brains. Figure 1 - Cyber is sexier than a Harvard trained, Academy Award winning actress. In our first blog post, I articulated that we are strong proponents of shift-left security. The idea that security should be incorporated as early as possible during application... Continue reading
WoTT secures the Internet of Things By Al Esmail on June 22, 2019 TL;DR It’s Let’s Encrypt for IoT - you know you want it. Figure 1 - If the web can have it, why can’t IoT? In my first blog post, I articulated why we do what we do at WoTT. Namely, that security is a necessary condition for a future involving advanced cyber-physical... Continue reading
Why we are doing what we do By Al Esmail on June 20, 2019 TL;DR the future has flying cars, transformers and low calorie diets. Figure 1 - Best free photo I could find when searching for ‘open source’ In our inaugural blog post, my aim is to introduce how we see the world and what we care about. Regarding what we do, I will simply... Continue reading
Using WoTT credentials to manage access to a Python 3 WebApp By Fiona McAllister on June 18, 2019 Another simple WebApp example Introduction In a previous example we introduced you to setting up a Simple WebApp using mTLS to provide security. This is one of a few ways to secure connection between a client and a server. In this example, we’ll be using another simple WebApp that instead uses HTTP... Continue reading
Using WoTT to secure a simple Python 3 WebApp By Fiona McAllister on June 16, 2019 A simple WebApp example Introduction In the following example, we’ll walk you through how to secure a simple WebApp using WoTT. Before you begin, you need two devices with the WoTT Agent installed. This can be a combination of devices that are either a Raspberry Pi or a desktop running a Debian... Continue reading
Using WoTT to secure access to Google Core IoT By Fiona McAllister on June 14, 2019 Using WoTT with Google Core IoT Introduction Before we get started, you will need to install the gcloud tool. This is used to interact with Google’s services. You can find installation instructions here. Follow the instructions for your specific distribution. You will also need to have at least one device with the... Continue reading
Subscribe to our newsletter