Please turn on your JavaScript for this page to function normally.
colors
Securing and managing the enterprise Internet of Things

A future where the Internet of Things spreads exponentially is almost certain. Seemingly everybody wants these devices: consumers for the helpful features and manufacturers …

IoT
Major flaws uncovered in leading IoT protocols

Trend Micro warned organizations to revisit their operational technology (OT) security after finding major design flaws and vulnerable implementations related to two popular …

hospital
Why hospitals are the next frontier of cybersecurity

Hospital cybersecurity is a pressing problem with unique challenges and incalculable stakes. The healthcare industry’s accelerating adoption of sophisticated networks, …

fast
Enabling the digital future: speed, agility and resilience

As more organizations embrace digital business, infrastructure and operations (I&O) leaders will need to evolve their strategies and skills to provide an agile …

industry
IIoT technologies integration creates expansion opportunities in the industrial cybersecurity industry

High penetration of Industrial Internet of Things (IIoT) technology in critical infrastructure and the manufacturing sector has resulted in a growing number of potential …

connections
Only 14% have complete organizational awareness of IoT threats

86 percent of IT and security decision makers across the globe believe their organization needs to improve its awareness of IoT threats, according to Trend Micro. This …

code
Helping researchers with IoT firmware vulnerability discovery

John Toterhi, a security researcher with IoT security company Finite State, believes that many of the security problems plaguing IoT devices are solvable problems through …

IoT
IoT related security missteps cost enterprises millions

Enterprises have begun sustaining significant monetary losses stemming from the lack of good practices as they move forward with incorporating the IoT into their business …

industrial
USB threat vector trends and implications for industrial operators

In an attempt to make industrial control systems less accessible to attackers, industrial players are limiting network access and increasingly using USB media devices to …

IoT
Most CIOs say IoT will become a major burden

Dynatrace announced the findings of an independent global survey of 800 CIOs, which reveals that 74% of IT leaders are concerned that IoT performance problems could directly …

Bleedingbit
Bleedingbit: Critical vulnerabilities in BLE chips expose millions of access points to attack

Armis today announced the discovery of two critical vulnerabilities in Bluetooth Low Energy (BLE) chips made by Texas Instruments (TI) and used in Cisco, Meraki and Aruba …

IoT
IoT users uncertain if personal data is shared across multiple devices

Most people (64%) say they don’t depend on their connected devices to accomplish daily activities, nearly twice as many as the 36% who indicate they depend on their …

Don't miss

Cybersecurity news