The internet of things (IoT) is growing exponentially, with as many as 25 billion devices expected to be deployed by 2030. IoT technology has many benefits for consumers, corporations and, in particular, the manufacturing, health care and transportati…
by Jonathan Reed •
In 2017, the number of connected devices surpassed the world’s human population. That’s a lot of things. However, many of them were not built with security in mind. It didn’t take long for attackers to take advantage of Internet of Things (IoT) vulnerabilities. One case in 2016 saw threat actors take down Dyn, a company […]
by Anitian •
We’re joined by Dr. Michael J. Savoie to discuss the top 5 cloud security trends and predictions to watch in 2022.
The post Cloudy Crystal Gazing: Top 5 Cloud Security Predictions for 2022 appeared first on Anitian.
The post Cloudy Crystal Gazing: Top…
by Tom Li •
Rogers Business, the enterprise-focused division of Rogers Communications, announced new smart city and smart buildings internet of things (IoT) solutions on Feb. 10. Expanding Rogers’ existing IoT portfolio, these new solutions from various Rogers partners enhance responsiveness and efficiency in water, parking, traffic, transit and fleet management. New smart buildings solution were also introduced with […]
The post Rogers Business introduces new IoT solutions for smart buildings and smart cities first appeared on IT World Canada.
by David Bisson •
Earlier this year, an enterprise security camera system maker suffered a data breach. The incident, which involved the compromise of a Jenkins server, enabled a group of attackers to bypass the company’s authorization system, including its two-factor authentication processes. Those responsible for the compromise then abused their access to release the photos and videos of […]
The post When it Comes to Stopping IoT Security Camera Breaches, Focus on Procurement appeared first on Security Intelligence.
by Mike Nelson •
The internet of things (IoT) has truly come of age, and innovative new use cases are emerging all around us. Each day, we’re seeing the IoT in businesses and factories, cities, vehicles and transportation systems—and in our daily lives. Studies show t…
by David Bisson •
Ransomware actors are targeting food and agriculture organizations, potentially disrupting business. Luckily, there are already formal structures in place to boost the IoT security defenses they need. Knowing them keeps the lifeblood of industrial farms and food delivery going. Businesses in the sector could “suffer significant financial loss,” the FBI said. That loss is “resulting […]
The post IoT Security: Protecting Food and Agriculture Organizations appeared first on Security Intelligence.
by Rob Dyson •
The health care industry is one of the most popular and lucrative targets for cyberattacks and malicious activity. Health care organizations always present as an attractive proposition to hackers as they possess high volumes of sensitive information about patients and rely on highly vulnerable medical devices. Advancements in medical procedures and the growth in digital […]
The post Understanding the Cyber Risk Exposures Within the Health Care Industry appeared first on Security Intelligence.
by Mike Elgan •
The Internet of Things (IoT) is a powerful boon to business. But it also represents a massive potential expansion of the cybersecurity attack surface. So far, IoT inclusion in many organizations has been poorly organized, haphazard and poorly planned. This needs to change. After all, IT security depends on IoT security. Why IoT Security Is […]
by Michael Vizard •
BlastWave today launched a BlastShield offering that combines a software-defined perimeter (SDP) with microsegmentation and passwordless multifactor authentication (MFA) to make it easier to enforce identity-based zero-trust security policies on edge …
by Dawn Blizard •
The Amazon-owned smart home product manufacturer Ring recently announced that it’s strengthening the security of its Internet of Things (IoT) motion-detecting doorbell cameras by offering end-to-end encryption (E2EE) for streaming video footage. There’s a catch, though. Users who opt to turn on E2EE will find that they need to make major tradeoffs. Convenience and usefulness […]
The post What Video Doorbells Have to Teach Us About the Difficulties of IoT Security appeared first on Security Intelligence.
by Sue Poremba •
Cybersecurity is all about protecting data, but it’s clear organizations need to make a greater effort to protect that data where it is, not where they’d like it to be or think it could end up. As more organizations are making the transiti…
by Sue Poremba •
The supply chain is something most people take for granted—until something goes wrong. The pandemic highlighted just how quickly business can grind to a halt if the supply chain is disrupted. Organizations have found that edge computing makes the supp…
by George Platsis •
So, 5G is one of those once-in-a-generation types of leaps that will alter how we operate. However, 5G security comes with a lot of challenges. Private 5G networks require us to look at attack surface management in a different way. How do they change the way we need to defend our data? And, what is […]
The post Private 5G Security: Consider Security Risks Before Investing appeared first on Security Intelligence.
by George Platsis •
With cybersecurity guidelines coming down from the executive branch, industry and policymakers clearly both see the extent of the cyberattack problem. Take a look at the contents of the Biden administration’s May executive order and what it means for people working in the industry, especially in regards to supply chain attacks. The executive order covers […]
The post What Biden’s Cybersecurity Executive Order Means for Supply Chain Attacks appeared first on Security Intelligence.