Internet of Things
Help Google design the Open Web of Things
Do you have an idea how the Internet of Things should work? You might want to share it with Google. The internet giant has long had an interest in IoT technologies, but is …
The rise of IoT 2.0 and the battle for the connected home
Sansa Security revealed the company’s Internet of Things (IoT) predictions for 2015, highlighting six of the top trends to watch out for next year. 1. The rise of IoT …
What will create cybersecurity challenges in 2015?
Security experts at Unisys predicted even greater cybersecurity challenges in the year ahead as continued growth in the use of mobile devices and applications in the …
Internet of Things predictions for 2015
IDC provides organizations with insight and perspective on long-term industry trends along with new themes that may be on the horizon. IoT and the cloud. Within the next five …
Cost savings drive businesses to the cloud
A survey of C-Level senior executives, developers and other industry delegates has found that 72% of respondents identified cost as the key benefit of using the cloud for the …
Hikvision DVRs sporting bugs that allow device hijacking
A while back, SANS ISC CTO Johannes Ullrich discovered that cybercrooks were targeting Hikvision Digital Video Recorders (DVRs) in order to infect them with bitcoin-mining …
Toshiba and Cisco to collaborate on new ways to utilize IoT
Toshiba and Cisco are collaborating on new ways to utilize the Internet of Everything that can dramatically improve processes, productivity and experiences in manufacturing, …
The most unpopular person in the room
That’s me. At least I was the week I wrote this. I had the wonderful opportunity to speak at a number of conferences that were not solely related to security. It was …
The biggest challenges around connected devices
Few European IT departments or workplaces are ready for the invasion of wearable technology and other connected devices. According to a 110-country survey of ISACA members who …
Vigilance and the Enterprise of Things
Most enterprises allow BYOD in their environment, with varying levels of supervision. Typically, these are tablets and smartphones but the number of other Internet of Things …
Internet of Things to reach 30 billion devices in 2020
While most everyone agrees that the Internet of Things (IoT) is poised for explosive growth and represents boundless opportunities – billions of connected things driving …
Mitigations for Spike DDoS toolkit-powered attacks
Akamai Technologies released, through the company’s Prolexic Security Engineering & Response Team (PLXsert), a new cybersecurity threat advisory that alerts …
Featured news
Resources
Don't miss
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence
- Misconfig Mapper: Open-source tool to uncover security misconfigurations
- Why AI deployment requires a new level of governance