Security Experts:

long dotted


Medtronic is recalling remote controllers used with some of its insulin pumps due to cybersecurity risks that could lead to injury and even death. [Read More]
CISA is telling organizations to patch their Hikvision cameras, just as the FCC announced taking steps toward removing Chinese equipment from U.S. networks. [Read More]
The four countries will support new initiatives to improve the resilience of critical infrastructure against cyberattacks. [Read More]
LG is acquiring Israel-based vehicle cybersecurity company Cybellum for roughly $240 million. [Read More]
More than 70 Hikvision cameras and NVRs are affected by a critical vulnerability that can allow an attacker to take control of devices without user interaction. [Read More]
More than 1,400 chips that support the Bluetooth Classic (BT) stack are likely affected by 16 newly disclosed vulnerabilities. [Read More]
Hackers could crash many applications remotely and without user interaction due to a serious vulnerability affecting the Linphone Session Initiation Protocol (SIP) client. [Read More]
Researchers have found a couple of vulnerabilities that can be used to remotely disarm home security systems made by Fortress. [Read More]
Mirai malware variant distributed in attacks exploiting Realtek SDK vulnerabilities. Attacks started a few days after disclosure of the flaws. [Read More]
A collection of vulnerabilities affecting multiple RTOSs and supporting libraries, BadAlloc could allow attackers to gain control of highly sensitive systems. [Read More]


rss icon

Seema Haji's picture
Smart IoT devices in industrial settings, such as energy, oil/gas and manufacturing, have shifted the perspective on OT environments from being reactive to proactive and predict failures.
Seema Haji's picture
New technology like IoMT in any space is always a double-edged sword. But the onus is not on manufacturers alone. It’s up to healthcare organizations to take the initiative to manage and secure their environments.
Seema Haji's picture
With the new year underway, it’s time for CISOs to see their security resolutions through from the factory floor, SOCs and across the entire enterprise.
Laurence Pitt's picture
Speech recognition systems make mistakes that could give cybercriminals access to a user’s home network. By activating a squatted skill, an unexpecting user could allow a malicious actor to extract information about their account, home network and even passwords before running the requested command.
Marc Solomon's picture
The ability to aggregate, score and prioritize data and alerts within the context of your environment can allow you to take the right actions faster to mitigate IoT risk.
Dean Weber's picture
IoT security is a tough challenge — involving everything from hard to implement standards; hard to reach industrial components; and choices on how to integrate security around both older “brownfield” and newer IoT systems and equipment.
Laurence Pitt's picture
Organizations are now running IoT application workloads in diverse locations that create complex ecosystems for IT and security personnel to oversee.
John Maddison's picture
Organizations can no longer afford to treat IoT devices as an isolated or independent component of their business, and must implement an effective IoT security strategy.
Laurence Pitt's picture
Advanced smart infrastructure, cloud networks and the Internet of Things (IoT) add more points of entry and ultimately more risk for both network operators and end users.
John Maddison's picture
Since access control technologies are usually the first network element that a new device touches, they need to be able to automatically recognize IoT devices.