Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Medtronic, DHS and FDA warn that some Medtronic insulin pumps are vulnerable to hacker attacks that can have serious consequences for their thousands of users. [Read More]
A new piece of malware is targeting improperly secured Internet of Things (IoT) devices with the purpose of bricking them, Akamai’s security researchers have discovered. [Read More]
Finite State finds many potential backdoors in Huawei equipment, and says the Chinese company’s products are less secure compared to other vendors. [Read More]
A variant of the Mirai Internet of Things (IoT) malware called Echobot uses a total of 26 different exploits for the infection phase, Akamai reports. [Read More]
Two vulnerabilities found in the Alaris Gateway Workstation from medical tech company BD can expose infusion pumps to hacker attacks. [Read More]
A new survey from Irdeto demonstrates that direct cyber-attacks against IIoT have already started, and that industry is not yet well prepared. [Read More]
Certificate Authority (CA) Sectigo, formerly Comodo CA, has acquired Icon Labs, a provider of cross-platform security solutions for embedded OEMs and Internet of Things (IoT) device manufacturers. [Read More]
Samsung unveils Exynos i T100, a new chip designed to enhance the security and reliability of IoT devices that use short-range communication protocols, such as BLE and Zigbee. [Read More]
NIST’s National Cybersecurity Center of Excellence (NCCoE) is working on an industrial IoT (IIoT) security project for the energy sector. [Read More]
The UK government has published a consultation document on the proposed regulation of consumer IoT devices. [Read More]

FEATURES, INSIGHTS // IoT Security

rss icon

Laurence Pitt's picture
Organizations are now running IoT application workloads in diverse locations that create complex ecosystems for IT and security personnel to oversee.
John Maddison's picture
Organizations can no longer afford to treat IoT devices as an isolated or independent component of their business, and must implement an effective IoT security strategy.
Laurence Pitt's picture
Advanced smart infrastructure, cloud networks and the Internet of Things (IoT) add more points of entry and ultimately more risk for both network operators and end users.
John Maddison's picture
Since access control technologies are usually the first network element that a new device touches, they need to be able to automatically recognize IoT devices.
Ashley Arbuckle's picture
Whether you work with in-house security resources or outside consultants, security experts are essential to help uncover vulnerabilities and offer recommendations to prioritize and mitigate risks.
Laurence Pitt's picture
Safeguarding emerging IoT ecosystems involves embedding visibility and protection into the fabric of the IoT network.
Torsten George's picture
Unfortunately, the Cyber Shield Act as it stands falls short, since it is a voluntary program that does not incentivize vendors to implement the NIST security standards.
Scott Simkin's picture
Just as there should be consistency across network, endpoint and cloud security, there should be the same consistency in identification, prevention, policy and enforcement of that policy for IoT security.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!