Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Vulnerabilities in the iLnkP2P implementation of P2P expose millions of cameras and other IoT devices to remote attacks from the Internet, and no patches are available. [Read More]
NIST updates its ACTS toolkit to help developers of safety-critical applications, such as the ones powering aircraft and nuclear power plants, find errors and make their software safer. [Read More]
A cybersecurity research company has uncovered over 30 security issues affecting Java Card technology, but Oracle and Gemalto have downplayed the impact of these flaws. [Read More]
IoT security firm VDOO raises $32 million in a Series B funding round, which brings the total raised by the company to $45 million. [Read More]
Serious DoS and access control vulnerabilities have been found by researchers in X-ray devices from Fujifilm. [Read More]
Intel adds Hardware Shield security feature to its new 8th Gen Intel Core vPro mobile processors to protect devices against firmware attacks. [Read More]
Enterprise IoT security firm Armis raises $65 million in a Series C funding round, which it will use to accelerate investments in engineering, marketing and sales. [Read More]
Hardcoded admin credentials found in the MyCar Controls mobile applications could have been exploited to locate and gain physical access to a vehicle. [Read More]
A recently discovered variant of the Mirai malware is targeting a wider range of IoT devices than before. [Read More]
A team of researchers has demonstrated that hackers can modify 3D medical scans to add or remove evidence of a serious illness, such as cancer. [Read More]

FEATURES, INSIGHTS // IoT Security

rss icon

Seema Haji's picture
The risk created by the proliferation of industrial IoT (IIoT) is rising, thanks to the continued mismanagement of third-party involvement in sensitive industrial environments.
Seema Haji's picture
Smart IoT devices in industrial settings, such as energy, oil/gas and manufacturing, have shifted the perspective on OT environments from being reactive to proactive and predict failures.
Seema Haji's picture
New technology like IoMT in any space is always a double-edged sword. But the onus is not on manufacturers alone. It’s up to healthcare organizations to take the initiative to manage and secure their environments.
Seema Haji's picture
With the new year underway, it’s time for CISOs to see their security resolutions through from the factory floor, SOCs and across the entire enterprise.
Laurence Pitt's picture
Speech recognition systems make mistakes that could give cybercriminals access to a user’s home network. By activating a squatted skill, an unexpecting user could allow a malicious actor to extract information about their account, home network and even passwords before running the requested command.
Marc Solomon's picture
The ability to aggregate, score and prioritize data and alerts within the context of your environment can allow you to take the right actions faster to mitigate IoT risk.
Dean Weber's picture
IoT security is a tough challenge — involving everything from hard to implement standards; hard to reach industrial components; and choices on how to integrate security around both older “brownfield” and newer IoT systems and equipment.
Laurence Pitt's picture
Organizations are now running IoT application workloads in diverse locations that create complex ecosystems for IT and security personnel to oversee.
John Maddison's picture
Organizations can no longer afford to treat IoT devices as an isolated or independent component of their business, and must implement an effective IoT security strategy.
Laurence Pitt's picture
Advanced smart infrastructure, cloud networks and the Internet of Things (IoT) add more points of entry and ultimately more risk for both network operators and end users.