Tag: Internet Of Things (IoT)
-
Here’s the NSA’s advice for reducing the exposure of cellphone location data
Written by Shannon Vavra Aug 4, 2020 | CYBERSCOOP Take it from the experts: There is no way to fully eliminate the risk that a mobile …
-
Take a Bite Out of Sweyn
If you work in the healthcare industry, you may have heard about a family of vulnerabilities called “SweynTooth.” Researchers from …
-
To Rank or Not to Rank Should Never Be a Question
Scanning is an important part of any vulnerability management program, and not just for traditional infrastructure. Cloud environments …
-
About That IoT Device You Received as a Holiday Gift…
It is quite possible that you received an internet of things (IoT) device as a holiday gift, and it’s very likely that you will find this …
-
The Future of Cybercrime: Where Are We Headed?
By 2024, the collective cost of data breaches will reach $5 trillion, according to a study by Juniper Research. The study predicted this …
-
M&A Security Considerations and the Importance of Due Diligence
Most post-merger cybersecurity challenges arise when the acquiring company fails to fully assess the cybersecurity posture of its …
-
Is It Time to Start Certifying Connected Devices?
At some point, you’ve likely seen markings and icons on an electronic device, its user manual or the box it came in. If you’re unsure …
-
5 IoT Security Conferences You Don’t Want to Miss
Unless your current threat management program is fully capable of securing internet of things (IoT) devices, you could likely benefit from …
-
Meanwhile at the Plant…The Realities of Operational Security in the Age of Connected Machines
As OT environments, especially with legacy systems in place, become increasingly connected, they may inherit risks that were previously the …
-
4 Information Security Slipups From ‘Star Trek: Discovery’ to Avoid in the Enterprise
The sophomore season of “Star Trek: Discovery” beamed and streamed its way to critical acclaim this year, praised by viewers and …
-
Beyond 2FA: Secure Your Critical Assets With Risk-Based Multifactor Authentication
Most of us have accepted that passwords are an insecure form of authentication — and, worse still, downright clunky. But that triggers a …
-
Industrial Control Systems Security: To Test or Not to Test?
The technologies behind industrial control systems (ICS) drive the core operational processes in industries such as manufacturing and …
●●●