IoT Agenda:

cybersecurity


February 11, 2020  12:47 PM

Ring device hacks highlight need for stronger IoT security

Damon Kachur Profile: Damon Kachur
attack prevention, Cyberattacks, cybersecurity, Data protection, Internet of Things, iot, IoT authentication, IoT compliance, IoT cybersecurity, iot security, IoT strategy

Once viewed as science fiction, devices such as smart doorbells not only exist, but are relatively commonplace. Unfortunately, the software and chipsets that make these devices "smart" has also made them a target for cyberattacks and, as you might have seen in the news recently, Ring doorbells and...

December 24, 2019  10:16 AM

Securing your organization for the holidays

Anthony Giandomenico Anthony Giandomenico Profile: Anthony Giandomenico
BYOD security, Cyber security, Cyberattacks, cybersecurity, Internet of Things, iot, IoT cybersecurity, Phishing

The holiday season is a time of giving. Tetailers are gearing up for a spike in online shopping, and charities are counting on end-of-year giving through their websites. At the same time, their employees are booking travel and buying the hottest toys and gadgets right from their desks. However,...


December 12, 2019  2:19 PM

Persistence of IoT botnets requires a security-driven network

Anthony Giandomenico Anthony Giandomenico Profile: Anthony Giandomenico
cybersecurity, Internet of Things, iot, IoT analytics, IoT cybersecurity, iot security, IoT strategy

Botnets continue to plague IoT devices, resulting in a range of criminal activity from denial of service attacks and dropping malicious payloads such as ransomware to hijacking unused IoT device CPU cycles for things like crypto mining. One of the most interesting aspects of


November 27, 2019  11:29 AM

Cybersecurity risks affect IIoT fog computing

Julian Weinberger Profile: Julian Weinberger
Cyberattacks, cybersecurity, encrypted communications, Encryption, fog computing, IIoT, IIoT data, IIoT security, remote access vpn, VPN

Cloud computing within IIoT is creating new opportunities for manufacturers and industrial systems. From connected cars and smart cities to real-time analytics and 5G mobile, IIoT sensors are generating data in unprecedented volumes. Since most essential smart factory services would be...


November 26, 2019  5:16 PM

Secure IoT devices and networks and bears, oh my!

Cheryl Ajluni Profile: Cheryl Ajluni
Cyberattacks, cybersecurity, Internet of Things, iot, IoT attacks, IoT cybersecurity, iot security, IoT strategy

There is a popular saying that goes something like this: You don't have to run faster than the bear to get away. You just have to run faster than the slowest guy running from the bear. As it turns out, that saying is as good a metaphor for life as it is for security in IoT. It all...


October 28, 2019  3:48 PM

Developing a defense-in-depth security practice for IoT

Galen Hunt Profile: Galen Hunt
connected devices, cybersecurity, Internet of Things, iot, IoT cybersecurity, iot security

Do you remember that time when you bought an SUV, renowned for its auto safety, and then decided that there was no need to wear a seatbelt? Or that time you decided not to install a smoke alarm because there was already a fire extinguisher in the house? These don’t sound like familiar...


October 24, 2019  2:54 PM

IoT security policy requires comprehensive, expansive visibility

Reggie Best Profile: Reggie Best
cybersecurity, healthcare IoT, Internet of Things, iot, IoT cybersecurity, iot security, security awareness, security in IOT

IoT is a black hole; every day it’s sucking in devices that must be secured. But IoT is also a nebulous term. Although emerging devices are easily identified at inception, decades-old technology has become part of the IoT universe --sometimes stealthily --and must be dealt with. These devices...


October 21, 2019  1:50 PM

3 more emerging attack surfaces need greater security

Carolyn Crandall Profile: Carolyn Crandall
cybersecurity, Internet of Things, iot, IoT applications, IoT cybersecurity, IoT network monitoring, iot security, Security threats, Shadow IT

This is the second part in a two-part series. Find the first part here. IoT is far from the only emerging attack surface being targeted and...


October 9, 2019  2:35 PM

Securing your supply chain is as important as securing your devices

Wayne Dorris Profile: Wayne Dorris
cybersecurity, Internet of Things, iot, IoT cybersecurity, iot security

The Ponemon Institute published its annual report on third-party IoT risks in May, 2019. The report focused on identifying what companies do not know -- or understand -- about the risks inherent to IoT devices and applications, particularly when used by third parties. The report drives home the...


September 26, 2019  11:57 AM

4 ways to minimize IoT cybersecurity risks

Thomas Ryd Profile: Thomas Ryd
cybersecurity, Cybersecurity legislation, Internet of Things, iot, IoT cybersecurity, iot security

With close to 400k followers, the Twitter account named Internet of Shit is the epitome of the dire situation emerging as we stumble into a world of connected devices. Governments around the world are waking up to a reality where the


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: