Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Honeywell introduces the Forge Cybersecurity Platform, a solution designed to help industrial organizations protect OT and IIoT assets. [Read More]
A critical vulnerability affecting D-Link DNS-320 NAS devices can be exploited remotely from the internet to take complete control of the system and the files stored on it. [Read More]
Researchers discover 125 vulnerabilities across 13 SOHO routers and NAS devices as part of a research project dubbed SOHOpelessly Broken 2.0. [Read More]
The attack traffic recorded by F-Secure's global network of honeypots tripled from the last six months of 2018 to the first six months of 2019. [Read More]
Palo Alto Networks acquires IoT security firm Zingbox for $75 million and announces financial results for FY 2019. [Read More]
Two United States senators have sent a letter to the National Highway Traffic Safety Administration (NHTSA) to inquire about cyber-risks associated with connected vehicles. [Read More]
Cisco has released a new hardware tool designed to help researchers, developers and automakers discover vulnerabilities in automobile computers. [Read More]
Researchers have demonstrated how malicious actors could launch ransomware attacks on DSLR cameras. [Read More]
Created by Cruise, FwAnalyzer is designed to provide continuous firmware security analysis by targeting filesystem images. [Read More]
Security researchers have discovered a series of vulnerabilities and attacks that they believe could be possible on Boeing's 787 Dreamliner. [Read More]

FEATURES, INSIGHTS // IoT Security

rss icon

Marc Solomon's picture
The ability to aggregate, score and prioritize data and alerts within the context of your environment can allow you to take the right actions faster to mitigate IoT risk.
Dean Weber's picture
IoT security is a tough challenge — involving everything from hard to implement standards; hard to reach industrial components; and choices on how to integrate security around both older “brownfield” and newer IoT systems and equipment.
Laurence Pitt's picture
Organizations are now running IoT application workloads in diverse locations that create complex ecosystems for IT and security personnel to oversee.
John Maddison's picture
Organizations can no longer afford to treat IoT devices as an isolated or independent component of their business, and must implement an effective IoT security strategy.
Laurence Pitt's picture
Advanced smart infrastructure, cloud networks and the Internet of Things (IoT) add more points of entry and ultimately more risk for both network operators and end users.
John Maddison's picture
Since access control technologies are usually the first network element that a new device touches, they need to be able to automatically recognize IoT devices.
Ashley Arbuckle's picture
Whether you work with in-house security resources or outside consultants, security experts are essential to help uncover vulnerabilities and offer recommendations to prioritize and mitigate risks.
Laurence Pitt's picture
Safeguarding emerging IoT ecosystems involves embedding visibility and protection into the fabric of the IoT network.
Torsten George's picture
Unfortunately, the Cyber Shield Act as it stands falls short, since it is a voluntary program that does not incentivize vendors to implement the NIST security standards.
Scott Simkin's picture
Just as there should be consistency across network, endpoint and cloud security, there should be the same consistency in identification, prevention, policy and enforcement of that policy for IoT security.