Please turn on your JavaScript for this page to function normally.
medical
Analysis of device data shines a light on cybersecurity risks in healthcare

The convergence of IT, IoT and OT makes it more difficult for the healthcare industry to manage a wide array of hard-to-control network security risks. IoT and OT devices are …

IoT
Data will be processed by edge computing in 59% of IoT deployments by 2025

Edge computing is on the rise in IoT deployments and is expected to show solid growth over the coming years, according to Strategy Analytics most recent report. Strategy …

pulse
Healthcare IT pros now confident in their cyber attack response ability

Almost two years since the ransomware attack that brought the NHS (National Health Service) to a halt, healthcare IT professionals feel more confident in their ability to …

IoT
The IoT threat landscape is expanding rapidly, yet few companies are addressing third party risk factors

There is a dramatic increase in IoT-related data breaches specifically due to an unsecured IoT device or application since 2017 – from 15 percent to 26 percent – and the …

5G
Mobile carriers believe security and reliability concerns will increase with 5G

Mobile service providers anticipate significant new revenue opportunities from the coming deployment of high-speed 5G networks and a host of new IoT-driven use cases, but they …

IoT
Flaws in the design of IoT devices prevent them from notifying homeowners about problems

Design flaws in smart home Internet of Things (IoT) devices that allow third parties to prevent devices from sharing information have been identified by researchers at North …

glasses
Consumers care deeply about their privacy, security, and how their personal information is handled

65% of consumers are concerned with the way connected devices collect data. More than half (55%) do not trust their connected devices to protect their privacy and a similar …

check
Researchers develop new tool for safety-critical software testing

We entrust our lives to software every time we step aboard a high-tech aircraft or modern car. A long-term research effort guided by two researchers at the National Institute …

healthcare
Legacy infrastructures and unmanaged devices top security risks in the healthcare industry

The proliferation of healthcare IoT devices, along with unpartitioned networks, insufficient access controls and the reliance on legacy systems, has exposed a vulnerable …

money
Consumers willing to adopt smart payments but companies need to guarantee security

Smart payments adoption shows substantial growth, but consumers have significant security concerns. TNS’ Consumers Confirm Smart Payments Adoption report evaluates US, UK and …

5G
Closed loop automation combats IoT security threats in the 5G age

The 5G race is on as carriers prepare for the onset of the next wireless generation in their own ways. While some have pseudo-definitions of 5G, others like Verizon and …

IoT
Securing your home increasingly means securing all of your IoT devices

The Internet of Things explosion has proven controversial due to the insufficient security measures in many of these internet-connected devices. IoT attacks increase And a new …

Don't miss

Cybersecurity news