Security Experts:

long dotted


Mozilla and 10 other organizations are asking major US retailers such as Target, Walmart, Best Buy and Amazon to require minimum security and privacy for the IoT devices they sell. [Read More]
A survey of over 650 people from organizations of all sizes in various sectors reveals the security, safety and privacy challenges and concerns related to IT/OT/IIoT convergence. [Read More]
The European Commission (EC) has ordered the recall of the ENOX Safe-Kid-One smart watch, saying it enables unauthenticated access sensitive personal to data and location history. [Read More]
Canon’s third generation of imageRUNNER ADVANCE printers introduces SIEM integration and other cybersecurity features that should help enterprises protect their systems against threats. [Read More]
Extreme Networks has launched Defender for IoT, which allows IoT devices to be segmented into multiple, isolated secure zones, further reducing the network attack surface. [Read More]
The Industrial Internet Consortium (IIC) and the OpenFog Consortium this week announced they finalized the details to merge into a single entity. [Read More]
Japan is preparing a national sweep of some 200 million network-connected gadgets for cyber-security lapses ahead of the 2020 Tokyo Olympic Games, an official said. [Read More]
Medical device security company Medigate raises $15 million in a Series A funding round, which it plans on using to accelerate growth and triple headcount. [Read More]
Identity management solutions provider Keyfactor, formerly Certified Security Solutions (CSS), raises $77 million, which it will use to accelerate market expansion and meet growing demand for its products. [Read More]
Serious vulnerabilities found by Kaspersky researchers in Moxa’s ThingsPro 2 product could allow malicious actors to launch remote attacks on industrial networks. [Read More]


rss icon

Seema Haji's picture
New technology like IoMT in any space is always a double-edged sword. But the onus is not on manufacturers alone. It’s up to healthcare organizations to take the initiative to manage and secure their environments.
Seema Haji's picture
With the new year underway, it’s time for CISOs to see their security resolutions through from the factory floor, SOCs and across the entire enterprise.
Laurence Pitt's picture
Speech recognition systems make mistakes that could give cybercriminals access to a user’s home network. By activating a squatted skill, an unexpecting user could allow a malicious actor to extract information about their account, home network and even passwords before running the requested command.
Marc Solomon's picture
The ability to aggregate, score and prioritize data and alerts within the context of your environment can allow you to take the right actions faster to mitigate IoT risk.
Dean Weber's picture
IoT security is a tough challenge — involving everything from hard to implement standards; hard to reach industrial components; and choices on how to integrate security around both older “brownfield” and newer IoT systems and equipment.
Laurence Pitt's picture
Organizations are now running IoT application workloads in diverse locations that create complex ecosystems for IT and security personnel to oversee.
John Maddison's picture
Organizations can no longer afford to treat IoT devices as an isolated or independent component of their business, and must implement an effective IoT security strategy.
Laurence Pitt's picture
Advanced smart infrastructure, cloud networks and the Internet of Things (IoT) add more points of entry and ultimately more risk for both network operators and end users.
John Maddison's picture
Since access control technologies are usually the first network element that a new device touches, they need to be able to automatically recognize IoT devices.
Ashley Arbuckle's picture
Whether you work with in-house security resources or outside consultants, security experts are essential to help uncover vulnerabilities and offer recommendations to prioritize and mitigate risks.