Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

CISA has added a Linux kernel flaw exploited by the Shikitega malware (CVE-2021-3493) to its known exploited vulnerabilities catalog. [Read More]
Google has announced KataOS, a security-focused and open source operating system for embedded devices running Ambient ML applications. [Read More]
BAE Systems unveils Viper Memory Loader Verifier II (MLV II), a system whose role is to protect F-16 fighter aircraft against cyberattacks. [Read More]
Nearly a dozen vulnerabilities, including critical flaws, have been found in a car parking management system made by Italian company Carlo Gavazzi. [Read More]
Hacktivists might not know a lot about ICS, but they’re well aware of the potential implications of hacking these devices, and some groups have been targeting ICS to draw attention to their cause. [Read More]
The EU is proposing new legislation to force manufacturers to ensure IoT devices meet cybersecurity standards, making the 27-nation bloc less vulnerable to attacks. [Read More]
LTE and 5G network security firm OneLayer recieved a $6.5 million equity investment from Koch Disruptive Technologies (KDT), the VC arm of Koch Industries. [Read More]
Vulnerabilities found in Flexlan wireless LAN devices used for airplane Wi-Fi can be exploited by a passenger to hack other passengers. [Read More]
Pwn2Own Toronto 2022 is offering more than $1 million in cash and prizes, including $100,000 for a new SOHO attack scenario. [Read More]
Self-disclosures by XIoT vendors have surpassed independent research outfits as the second most prolific vulnerability reporters. [Read More]

FEATURES, INSIGHTS // IoT Security

rss icon

Galina Antova's picture
Understanding the vulnerability landscape of the XIoT to properly assess and mitigate risk is critically important to protect livelihoods and lives.
Marie Hattar's picture
Cybersecurity within the automotive industry has a long way to go to catch up to traditional enterprise cybersecurity standards and best practices.
Marie Hattar's picture
For Smart Cities to truly live up to their promise, we shouldn’t forget that – like all infrastructure – safety and security are a top priority.
Marie Hattar's picture
As IoT adoption increases within healthcare, healthcare organizations and device manufacturers will need to prioritize the security of connected medical devices to keep patient data private and ensure the safety of the patient.
Derek Manky's picture
Linux is becoming a more popular target for attackers as it operates the back-end systems of many networks and container-based solutions for IoT devices and mission-critical applications.
Galina Antova's picture
Given the range and complexity of XIoT, it’s understandable that CISOs want to have a comprehensive view across all aspects and elements of their networks, spanning industrial, healthcare, and enterprise environments.
Marie Hattar's picture
There is a pressing need tighten IoT security, especially in an insecure world where these unmanaged devices are playing a rapidly-growing and increasingly important role
Yaniv Vardi's picture
Proactive risk management requires being able to examine and address risk from different yet complementary perspectives to bring context to the overall security of an OT environment.
Torsten George's picture
Today’s dynamic threatscape requires security professionals to adjust to an ever-expanding attack surface.
Justin Fier's picture
As IoT devices turn homes into ‘smart homes’, they also expose consumers to cyber-attacks in their everyday lives. The industry needs to bring its attention back to these issues and identify potential solutions.