Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

NIST's SP 1800-8 applies "security controls to the pump's ecosystem to create a 'defense-in-depth' solution for protecting infusion pumps and their surrounding systems. [Read More]
Threat actors can disrupt a power grid’s normal operation using a botnet of tens of thousands of compromised high-wattage IoT devices such as air conditioners and heaters [Read More]
Researchers show how hackers could target urban water utilities through the smart irrigation systems used by their customers [Read More]
Critical vulnerabilities discovered in smart city systems can be exploited by hackers to cause panic, researchers warn [Read More]
High volume of malicious internal reconnaissance and lateral movement observed in the manufacturing industry, reports threat detection firm Vectra [Read More]
HP releases firmware updates to patch two critical remote code execution vulnerabilities affecting 160 of its ink printers [Read More]
Research conducted by IoT security firm Armis shows that DNS rebinding exposes nearly half a billion devices in the enterprise to attacks [Read More]
Researchers demonstrate that the Z-Wave protocol, which is used by more than 100 million IoT devices, is vulnerable to security downgrade attacks [Read More]
Chinese researchers find over a dozen locally and remotely exploitable vulnerabilities in BMW cars. The company has confirmed the flaws and started rolling out patches [Read More]
FireEye researchers discover several vulnerabilities in Logitech’s Harmony Hub home control system. Flaws patched with firmware update [Read More]

FEATURES, INSIGHTS // IoT Security

rss icon

John Maddison's picture
Organizations can no longer afford to treat IoT devices as an isolated or independent component of their business, and must implement an effective IoT security strategy.
Laurence Pitt's picture
Advanced smart infrastructure, cloud networks and the Internet of Things (IoT) add more points of entry and ultimately more risk for both network operators and end users.
John Maddison's picture
Since access control technologies are usually the first network element that a new device touches, they need to be able to automatically recognize IoT devices.
Ashley Arbuckle's picture
Whether you work with in-house security resources or outside consultants, security experts are essential to help uncover vulnerabilities and offer recommendations to prioritize and mitigate risks.
Laurence Pitt's picture
Safeguarding emerging IoT ecosystems involves embedding visibility and protection into the fabric of the IoT network.
Torsten George's picture
Unfortunately, the Cyber Shield Act as it stands falls short, since it is a voluntary program that does not incentivize vendors to implement the NIST security standards.
Scott Simkin's picture
Just as there should be consistency across network, endpoint and cloud security, there should be the same consistency in identification, prevention, policy and enforcement of that policy for IoT security.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!