Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Honeywell introduces the Forge Cybersecurity Platform, a solution designed to help industrial organizations protect OT and IIoT assets. [Read More]
A critical vulnerability affecting D-Link DNS-320 NAS devices can be exploited remotely from the internet to take complete control of the system and the files stored on it. [Read More]
Researchers discover 125 vulnerabilities across 13 SOHO routers and NAS devices as part of a research project dubbed SOHOpelessly Broken 2.0. [Read More]
The attack traffic recorded by F-Secure's global network of honeypots tripled from the last six months of 2018 to the first six months of 2019. [Read More]
Palo Alto Networks acquires IoT security firm Zingbox for $75 million and announces financial results for FY 2019. [Read More]
Two United States senators have sent a letter to the National Highway Traffic Safety Administration (NHTSA) to inquire about cyber-risks associated with connected vehicles. [Read More]
Cisco has released a new hardware tool designed to help researchers, developers and automakers discover vulnerabilities in automobile computers. [Read More]
Researchers have demonstrated how malicious actors could launch ransomware attacks on DSLR cameras. [Read More]
Created by Cruise, FwAnalyzer is designed to provide continuous firmware security analysis by targeting filesystem images. [Read More]
Security researchers have discovered a series of vulnerabilities and attacks that they believe could be possible on Boeing's 787 Dreamliner. [Read More]

FEATURES, INSIGHTS // IoT Security

rss icon

Seema Haji's picture
Because blockchain can process millions of transactions accurately and in the right order, it can protect the data exchanges happening between IoT devices.
Gunter Ollmann's picture
In a world of over-hyped bugs, stunt hacking, and branded vulnerability disclosures, my advice to CISOs is to make security lemonade by finding practical next steps to take.
Seema Haji's picture
An insider breach targeting OT and IoT systems has the potential to shut down electrical grids, contaminate water supplies and otherwise destroy a nation’s infrastructure.
Seema Haji's picture
Technologies like artificial intelligence (AI), augmented reality (AR) and machine learning (ML) once seemed stranger than fiction, but are now playing a growing role in industrial environments.
Seema Haji's picture
The risk created by the proliferation of industrial IoT (IIoT) is rising, thanks to the continued mismanagement of third-party involvement in sensitive industrial environments.
Seema Haji's picture
Smart IoT devices in industrial settings, such as energy, oil/gas and manufacturing, have shifted the perspective on OT environments from being reactive to proactive and predict failures.
Seema Haji's picture
New technology like IoMT in any space is always a double-edged sword. But the onus is not on manufacturers alone. It’s up to healthcare organizations to take the initiative to manage and secure their environments.
Seema Haji's picture
With the new year underway, it’s time for CISOs to see their security resolutions through from the factory floor, SOCs and across the entire enterprise.
Laurence Pitt's picture
Speech recognition systems make mistakes that could give cybercriminals access to a user’s home network. By activating a squatted skill, an unexpecting user could allow a malicious actor to extract information about their account, home network and even passwords before running the requested command.
Marc Solomon's picture
The ability to aggregate, score and prioritize data and alerts within the context of your environment can allow you to take the right actions faster to mitigate IoT risk.