Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

BlackBerry is licensing its security technology to IoT device manufacturers. A BlackBerry survey of 4,000 people in the US, UK and Canada shows that most don’t trust Internet-connected devices. [Read More]
The US tech industry is weathering a crisis of confidence over data protection and a difficult geopolitical situation, with record sales expected in 2019, say organizers of the Consumer Electronics Show. [Read More]
The Novidade exploit kit is targeting home and small office routers in an attempt to compromise the mobile devices or desktop computers connected to the routers. [Read More]
Symantec unveils Industrial Control System Protection (ICSP) Neural, a USB scanning station designed to protect industrial and IoT environments against USB-borne malware. [Read More]
Malicious actors could abuse machine-to-machine (M2M) protocols such as MQTT and CoAP in attacks aimed at IoT and industrial IoT systems. [Read More]
Firmware security company Eclypsium raises $8.75 million in a Series A funding round, which brings the total raised by the firm to date to over $11 million. [Read More]
Trend Micro and Moxa announce TXOne Networks, a joint venture focusing on securing Industrial Internet of Things (IIoT) environments [Read More]
Start-up firm DUST Identity has emerged from stealth with $2.3 million seed funding led by Kleiner Perkins, launch a scientifically-backed solution for supply chain management fit for mission-critical enterprises. [Read More]
Vulnerabilities discovered by researchers in several Roche medical devices can put patients at risk [Read More]
BLEEDINGBIT: Millions of enterprise access points and other network devices may be exposed to remote attacks due to vulnerabilities in Bluetooth Low Energy (BLE) chips made by Texas Instruments [Read More]

FEATURES, INSIGHTS // IoT Security

rss icon

Dean Weber's picture
IoT security is a tough challenge — involving everything from hard to implement standards; hard to reach industrial components; and choices on how to integrate security around both older “brownfield” and newer IoT systems and equipment.
Laurence Pitt's picture
Organizations are now running IoT application workloads in diverse locations that create complex ecosystems for IT and security personnel to oversee.
John Maddison's picture
Organizations can no longer afford to treat IoT devices as an isolated or independent component of their business, and must implement an effective IoT security strategy.
Laurence Pitt's picture
Advanced smart infrastructure, cloud networks and the Internet of Things (IoT) add more points of entry and ultimately more risk for both network operators and end users.
John Maddison's picture
Since access control technologies are usually the first network element that a new device touches, they need to be able to automatically recognize IoT devices.
Ashley Arbuckle's picture
Whether you work with in-house security resources or outside consultants, security experts are essential to help uncover vulnerabilities and offer recommendations to prioritize and mitigate risks.
Laurence Pitt's picture
Safeguarding emerging IoT ecosystems involves embedding visibility and protection into the fabric of the IoT network.
Torsten George's picture
Unfortunately, the Cyber Shield Act as it stands falls short, since it is a voluntary program that does not incentivize vendors to implement the NIST security standards.
Scott Simkin's picture
Just as there should be consistency across network, endpoint and cloud security, there should be the same consistency in identification, prevention, policy and enforcement of that policy for IoT security.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!