Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

A vast majority of OT devices affected by the Urgent/11 vulnerabilities and many devices affected by an actively exploited CDPwn flaw remain unpatched. [Read More]
Over 100 CT, X-Ray, MRI and other types of medical devices made by GE Healthcare are affected by a critical vulnerability that could allow an attacker to access or modify sensitive data. [Read More]
On Friday, December 4, U.S. President Donald Trump signed the Internet of Things Cybersecurity Improvement Act of 2020 into law. [Read More]
A group of academic researchers has devised a new eavesdropping attack that leverages the lidar sensors present in commodity robot vacuum cleaners. [Read More]
Researchers have demonstrated that a Tesla Model X can be stolen in minutes via an attack targeting the keyless entry system. [Read More]
The IoT Cybersecurity Improvement Act, which aims to improve the security of IoT devices, has passed the Senate and is heading to the White House for the president’s signature. [Read More]
Hundreds of Tesla Powerwall Backup Gateways may have been exposed to hacker attacks from the internet, but Tesla says it has taken steps to reduce risks. [Read More]
SentinelOne has raised $267 million in an oversubscribed Series F funding round, valuing the company at more than $3 billion. [Read More]
Bug bounty hunters have earned a total of over $1.2 million at a major Chinese hacking competition, including $180,000 for iPhone exploits and $100,000 for Chrome exploits. [Read More]
Bug bounty hunters have hacked routers, NAS devices and TVs at the Pwn2Own Tokyo 2020 hacking competition. [Read More]

FEATURES, INSIGHTS // IoT Security

rss icon

Torsten George's picture
Today’s dynamic threatscape requires security professionals to adjust to an ever-expanding attack surface.
Justin Fier's picture
As IoT devices turn homes into ‘smart homes’, they also expose consumers to cyber-attacks in their everyday lives. The industry needs to bring its attention back to these issues and identify potential solutions.
Gunter Ollmann's picture
Securing smart cities offers many opportunities to rethink our assumptions on security and “level up” the discussion to solve problems at the ecosystem level.
Seema Haji's picture
Because blockchain can process millions of transactions accurately and in the right order, it can protect the data exchanges happening between IoT devices.
Gunter Ollmann's picture
In a world of over-hyped bugs, stunt hacking, and branded vulnerability disclosures, my advice to CISOs is to make security lemonade by finding practical next steps to take.
Seema Haji's picture
An insider breach targeting OT and IoT systems has the potential to shut down electrical grids, contaminate water supplies and otherwise destroy a nation’s infrastructure.
Seema Haji's picture
Technologies like artificial intelligence (AI), augmented reality (AR) and machine learning (ML) once seemed stranger than fiction, but are now playing a growing role in industrial environments.
Seema Haji's picture
The risk created by the proliferation of industrial IoT (IIoT) is rising, thanks to the continued mismanagement of third-party involvement in sensitive industrial environments.
Seema Haji's picture
Smart IoT devices in industrial settings, such as energy, oil/gas and manufacturing, have shifted the perspective on OT environments from being reactive to proactive and predict failures.
Seema Haji's picture
New technology like IoMT in any space is always a double-edged sword. But the onus is not on manufacturers alone. It’s up to healthcare organizations to take the initiative to manage and secure their environments.