Security Experts:

long dotted


The state of California recently passed a bill (SB-327) that requires the manufacturers of connected devices to use unique hardcoded passwords for each device manufactured. [Read More]
Precise agriculture is exposed to vulnerabilities and cyber-threats, a new report from the United States Department of Homeland Security (DHS) warns. [Read More]
Splunk unveils Splunk for Industrial IoT, a solution designed to help organizations secure ICS, monitor and diagnose equipment, and predict downtime [Read More]
California governor signs IoT cybersecurity law, along with a state-level net neutrality law [Read More]
Torii is a stealthy Internet of Things (IoT) botnet that attempts to achieve persistence by running six different routines at once, Avast has discovered. [Read More]
Researchers have been seeing improvements in vehicle cybersecurity – local interfaces are increasingly hardened and there are fewer critical and high-impact vulnerabilities [Read More]
Critical NUUO software vulnerability dubbed Peekaboo could allow attackers to remotely view video feeds and tamper with the recordings of hundreds of thousands of IoT cameras [Read More]
One year after the BlueBorne flaws were disclosed, more than 2 billion devices are still vulnerable to attacks, either because users have failed to install patches or because no fixes are available [Read More]
The key fob of Tesla Model S and possibly other vehicles can be cloned in seconds using a new attack method disclosed this week by a team of researchers [Read More]
Mobile Pwn2Own renamed Pwn2Own Tokyo after ZDI adds IoT category, which includes Apple Watch, Amazon Echo, Google Home, Nest Cam IQ Indoor and Amazon Cloud Cam [Read More]


rss icon

John Maddison's picture
Organizations can no longer afford to treat IoT devices as an isolated or independent component of their business, and must implement an effective IoT security strategy.
Laurence Pitt's picture
Advanced smart infrastructure, cloud networks and the Internet of Things (IoT) add more points of entry and ultimately more risk for both network operators and end users.
John Maddison's picture
Since access control technologies are usually the first network element that a new device touches, they need to be able to automatically recognize IoT devices.
Ashley Arbuckle's picture
Whether you work with in-house security resources or outside consultants, security experts are essential to help uncover vulnerabilities and offer recommendations to prioritize and mitigate risks.
Laurence Pitt's picture
Safeguarding emerging IoT ecosystems involves embedding visibility and protection into the fabric of the IoT network.
Torsten George's picture
Unfortunately, the Cyber Shield Act as it stands falls short, since it is a voluntary program that does not incentivize vendors to implement the NIST security standards.
Scott Simkin's picture
Just as there should be consistency across network, endpoint and cloud security, there should be the same consistency in identification, prevention, policy and enforcement of that policy for IoT security.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!