Internet of Things

Number of vulnerable enterprises at five year record high
Enterprises across the globe are refreshing their network equipment earlier in its lifecycle in a move to embrace workplace mobility, Internet of Things, and software-defined …

Half of EMEA CIOs participating in a digital ecosystem
CIOs in Europe, the Middle East and Africa (EMEA) are clearly engaging with the era of digital business, with 50 percent participating in a digital ecosystem and 65 percent …

Apocalypse now: The IoT DDoS threat
One of the things you learn about humanity, if you’re paying attention, is that “gold rushes” bring out the worse in us. When there are no constraints and there is a greed …

CloudConnect: Enabling the Industrial Internet of Things
In this podcast recorded at IoT Solutions World Congress Barcelona 2016, Andrew Ginter, VP of Industrial Security at Waterfall Security, talks about Unidirectional …

Cisco plugs critical hole in Prime Home management platform
Cisco has released nine security alerts on Wednesday, and among these are two for critical vulnerabilities in its ASR 900 Series routers and the Cisco Prime Home management …

Linux/IRCTelnet creates new, powerful IoT DDoS botnet
Linux/IRCTelnet (new Aidra), a new piece of Linux malware targeting IoT devices and turning them into DDoS-capable bots, has been spotted and analyzed by one of the …

The difference between IT security and ICS security
In this podcast recorded at IoT Solutions World Congress Barcelona 2016, Andrew Ginter, VP of Industrial Security at Waterfall Security, talks about the difference between IT …

Can we extinguish the Mirai threat?
The recent massive DDoS attack against DNS provider Dyn has jolted (some of) the general public and legislators, and has opened their eyes to the danger of insecure IoT …

Building the IoT monster
When Mary Shelley wrote Frankenstein, she imagined the misguided doctor assembling his creature from dead body parts, who instead of elevating science, created something dark …

Understanding IoT botnets
If you were online on Friday October 21st, you were probably affected by the DDoS attack against managed DNS provider Dyn. Dyn observed that tens of millions of IP addresses …

Photos: IoT Solutions World Congress Barcelona 2016
This week, the world’s leading industrial Internet companies and experts gathered at the Fira de Barcelona for the IoT Solutions World Congress (IoTSWC) in order to showcase …

Smart city initiatives: Highly integrated and complex problems to solve
Every day, leaders of large cities grapple with knotty, complex problems like decaying public transportation infrastructures, aging utility lines, urban blight, neighborhoods …
Featured news
Resources
Don't miss
- Avoiding vendor lock-in when using managed cloud security services
- The CISO’s dilemma of protecting the enterprise while driving innovation
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence