Jan 29, 2013How real is the threat of an RFID-based network attack, or the use of counterfeit RFID tags? Is it possible a tag's user data could be utilized to pass malware or viruses onto back-end systems, which could then interrupt business processes or expose sensitive business data? How likely is it that an RFID tag could be cloned, or the data manipulated? In this session, hear from two founding members of the RFID Security Alliance (RFIDSA) regarding the need for companies that implement RFID applications to focus on security and privacy. Learn the potential business risks associated with RFID networks, and how organizations can safeguard against vulnerabilities.
Speaker: Lukas Grunwald, CTO and Co-founder, NeoCatena Networks Inc.