Security Experts:

long dotted


TXOne Networks, the IIoT security-focused joint venture between Trend Micro and Moxa, unveiled its first product, an industrial intrusion prevention system (IPS). [Read More]
Cisco warned that patches released in January for vulnerabilities in Small Business RV320 and RV325 routers were incomplete. The flaws have been exploited in live attacks. [Read More]
Microsoft released a new set of tools to help secure Internet of Things projects within corporate environments. [Read More]
Shodan announces Monitor, a new service designed to help organizations keep track of systems connected to the Internet. [Read More]
The Department of Homeland Security (DHS) has issued an alert to warn of critical vulnerabilities impacting numerous Medtronic devices, which are exploitable with low skill level. [Read More]
A team of researchers has earned $35,000 and a Tesla Model 3 after hacking the car’s web browser at Pwn2Own 2019. In total, $545,000 was paid out to participants for 19 flaws. [Read More]
Nearly 20 vulnerabilities have been found by researchers in Oracle’s Java Card technology, which is used for smart cards and SIMs. Oracle says the technology is deployed on nearly six billion devices each year. [Read More]
A new variant of the Mirai botnet is targeting IoT devices specifically intended for businesses, potentially signaling a focus toward enterprise. [Read More]
Four senators backed by two representatives and several tech giants have reintroduced a bill whose goal is to improve the security of Internet of Things (IoT) devices. [Read More]
Vulnerabilities in high-end smart alarms for cars exposed millions of vehicles to hacker attacks that could have had serious consequences. [Read More]


rss icon

Seema Haji's picture
Smart IoT devices in industrial settings, such as energy, oil/gas and manufacturing, have shifted the perspective on OT environments from being reactive to proactive and predict failures.
Seema Haji's picture
New technology like IoMT in any space is always a double-edged sword. But the onus is not on manufacturers alone. It’s up to healthcare organizations to take the initiative to manage and secure their environments.
Seema Haji's picture
With the new year underway, it’s time for CISOs to see their security resolutions through from the factory floor, SOCs and across the entire enterprise.
Laurence Pitt's picture
Speech recognition systems make mistakes that could give cybercriminals access to a user’s home network. By activating a squatted skill, an unexpecting user could allow a malicious actor to extract information about their account, home network and even passwords before running the requested command.
Marc Solomon's picture
The ability to aggregate, score and prioritize data and alerts within the context of your environment can allow you to take the right actions faster to mitigate IoT risk.
Dean Weber's picture
IoT security is a tough challenge — involving everything from hard to implement standards; hard to reach industrial components; and choices on how to integrate security around both older “brownfield” and newer IoT systems and equipment.
Laurence Pitt's picture
Organizations are now running IoT application workloads in diverse locations that create complex ecosystems for IT and security personnel to oversee.
John Maddison's picture
Organizations can no longer afford to treat IoT devices as an isolated or independent component of their business, and must implement an effective IoT security strategy.
Laurence Pitt's picture
Advanced smart infrastructure, cloud networks and the Internet of Things (IoT) add more points of entry and ultimately more risk for both network operators and end users.
John Maddison's picture
Since access control technologies are usually the first network element that a new device touches, they need to be able to automatically recognize IoT devices.