Security Experts:

long dotted


New malware named Chalubo is targeting IoT devices to ensnare them into a DDoS botnet [Read More]
Celia/VGo telepresence robots from Vecna are affected by several vulnerabilities [Read More]
A vulnerability in the software update process of certain Medtronic Programmer models has determined the company to block the functionality on some devices [Read More]
The state of California recently passed a bill (SB-327) that requires the manufacturers of connected devices to use unique hardcoded passwords for each device manufactured. [Read More]
Precise agriculture is exposed to vulnerabilities and cyber-threats, a new report from the United States Department of Homeland Security (DHS) warns. [Read More]
Splunk unveils Splunk for Industrial IoT, a solution designed to help organizations secure ICS, monitor and diagnose equipment, and predict downtime [Read More]
California governor signs IoT cybersecurity law, along with a state-level net neutrality law [Read More]
Torii is a stealthy Internet of Things (IoT) botnet that attempts to achieve persistence by running six different routines at once, Avast has discovered. [Read More]
Researchers have been seeing improvements in vehicle cybersecurity – local interfaces are increasingly hardened and there are fewer critical and high-impact vulnerabilities [Read More]
Critical NUUO software vulnerability dubbed Peekaboo could allow attackers to remotely view video feeds and tamper with the recordings of hundreds of thousands of IoT cameras [Read More]


rss icon

Dean Weber's picture
IoT security is a tough challenge — involving everything from hard to implement standards; hard to reach industrial components; and choices on how to integrate security around both older “brownfield” and newer IoT systems and equipment.
Laurence Pitt's picture
Organizations are now running IoT application workloads in diverse locations that create complex ecosystems for IT and security personnel to oversee.
John Maddison's picture
Organizations can no longer afford to treat IoT devices as an isolated or independent component of their business, and must implement an effective IoT security strategy.
Laurence Pitt's picture
Advanced smart infrastructure, cloud networks and the Internet of Things (IoT) add more points of entry and ultimately more risk for both network operators and end users.
John Maddison's picture
Since access control technologies are usually the first network element that a new device touches, they need to be able to automatically recognize IoT devices.
Ashley Arbuckle's picture
Whether you work with in-house security resources or outside consultants, security experts are essential to help uncover vulnerabilities and offer recommendations to prioritize and mitigate risks.
Laurence Pitt's picture
Safeguarding emerging IoT ecosystems involves embedding visibility and protection into the fabric of the IoT network.
Torsten George's picture
Unfortunately, the Cyber Shield Act as it stands falls short, since it is a voluntary program that does not incentivize vendors to implement the NIST security standards.
Scott Simkin's picture
Just as there should be consistency across network, endpoint and cloud security, there should be the same consistency in identification, prevention, policy and enforcement of that policy for IoT security.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!