Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Hackers linked to the Russian government are using IoT devices as points of ingress to establish a presence on corporate networks. [Read More]
Several major industrial and automation solutions providers have responded to the Wind River VxWorks vulnerabilities dubbed Urgent/11. [Read More]
A fleet-wide hack on cars during rush hour in major U.S. metropolitan areas could result in approximately 3,000 fatalities, a group warns, but experts say a proposed "Kill Switch" is not the solution. [Read More]
Less than a fifth of professionals who responded to a recent poll say they are very confident in their ability to secure Internet of Things (IoT) and Industrial IoT (IIoT) devices. [Read More]
A variant of the Mirai Internet of Things (IoT) malware is using a command and control (C&C) server on the Tor network, Trend Micro’s security researchers have discovered. [Read More]
Security researchers have demonstrated an attack on an IP camera that results in fake replay footage being displayed to security operators. [Read More]
Microsoft announced the general availability of Azure Security Center for Internet of Things (IoT) devices. [Read More]
A Mirai-based botnet has recently launched a massive, 13-day long distributed denial of service (DDoS) on a single online service, Imperva reveals. [Read More]
Researchers discovered a serious vulnerability that gave remote attackers access to millions of files stored on thousands of discontinued Lenovo storage devices. [Read More]
Researchers discovered a vulnerability that can be used to hack some of GE Healthcare’s hospital anesthesia devices, but the vendor says there is no clinical hazard or direct patient risk. [Read More]

FEATURES, INSIGHTS // IoT Security

rss icon

Dean Weber's picture
IoT security is a tough challenge — involving everything from hard to implement standards; hard to reach industrial components; and choices on how to integrate security around both older “brownfield” and newer IoT systems and equipment.
Laurence Pitt's picture
Organizations are now running IoT application workloads in diverse locations that create complex ecosystems for IT and security personnel to oversee.
John Maddison's picture
Organizations can no longer afford to treat IoT devices as an isolated or independent component of their business, and must implement an effective IoT security strategy.
Laurence Pitt's picture
Advanced smart infrastructure, cloud networks and the Internet of Things (IoT) add more points of entry and ultimately more risk for both network operators and end users.
John Maddison's picture
Since access control technologies are usually the first network element that a new device touches, they need to be able to automatically recognize IoT devices.
Ashley Arbuckle's picture
Whether you work with in-house security resources or outside consultants, security experts are essential to help uncover vulnerabilities and offer recommendations to prioritize and mitigate risks.
Laurence Pitt's picture
Safeguarding emerging IoT ecosystems involves embedding visibility and protection into the fabric of the IoT network.
Torsten George's picture
Unfortunately, the Cyber Shield Act as it stands falls short, since it is a voluntary program that does not incentivize vendors to implement the NIST security standards.
Scott Simkin's picture
Just as there should be consistency across network, endpoint and cloud security, there should be the same consistency in identification, prevention, policy and enforcement of that policy for IoT security.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!