Internet of Things
IoT and the great data heist
The term mobile has evolved from the device that simply made and received phone calls, to smartphones, wearables and a multitude of devices in the home. With the introduction …
Securing the smart grid: European Network of Cyber Security
Dr. Klaus Kursawe is the Chief Scientist at the European Network of Cyber Security (ENCS), where he is leading the research and development activities for critical …
Planning for the Internet of Things
As organizations plan for the future, and how security has to operate within their business, they now have to worry about the Internet of Things (IoT). There’s a clear …
Network discovery and visibility for massive enterprise networks
At RSA Conference 2015, Auconet unveiled its new Enterprise Security Foundation (ESF) that fortifies security for both partners and enterprises. ESF provides third-party …
IoT creates new set of risks, orgs embrace active defense
If the past 12 months saw a dramatic increase in data breach activity, then the year ahead promises to bring an entirely new set of concerns – and a shift in how companies are …
Security guidance for early IoT adopters
The Internet of Things (IoT) provides new and enhanced capabilities across diverse industries and enterprise functions, as well as unique security challenges associated with …
Internet of Everything attack surface grows
The proliferation of more than 16 billion connected computing devices today has significantly expanded the attack surface of our interconnected world. Unauthorized, BYOD, …
IoT devices facilitate robbery, stalking and cybercrime
The foundation of the Internet of Things (IoT) – the devices themselves plus their associated mobile applications and cloud services – are often not designed with …
Smart cities to use 1.1 billion connected things
Increasing urbanization is putting unprecedented pressure on city mayors to constantly balance the challenge of resource constraints against environmental sustainability …
Do smart machines require ethical programming?
Realizing the potential of smart machines — and ensuring successful outcomes for the businesses that rely on them — will hinge on how trusted smart machines are and how well …
Hacking Nest Thermostat
TrapX confirmed the design flaws discovered in the Nest Learning Thermostat. They validated the attack vector presented at the Black Hat 2014 conference by compromising the …
IoT architectures to impact analytics, stakeholders and infrastructure
The opportunity of the Internet of Things (IoT) has everything to do with data. By distributing and diversifying data, IoT architectures will dramatically impact analytics, …