IoT Agenda:

IoT cybersecurity


October 28, 2019  3:48 PM

Developing a defense-in-depth security practice for IoT

Galen Hunt Profile: Galen Hunt
connected devices, cybersecurity, Internet of Things, iot, IoT cybersecurity, iot security

Do you remember that time when you bought an SUV, renowned for its auto safety, and then decided that there was no need to wear a seatbelt? Or that time you decided not to install a smoke alarm because there was already a fire extinguisher in the house? These don’t sound like familiar...

October 24, 2019  2:54 PM

IoT security policy requires comprehensive, expansive visibility

Reggie Best Profile: Reggie Best
cybersecurity, healthcare IoT, Internet of Things, iot, IoT cybersecurity, iot security, security awareness, security in IOT

IoT is a black hole; every day it’s sucking in devices that must be secured. But IoT is also a nebulous term. Although emerging devices are easily identified at inception, decades-old technology has become part of the IoT universe --sometimes stealthily --and must be dealt with. These devices...


October 21, 2019  1:50 PM

3 more emerging attack surfaces need greater security

Carolyn Crandall Profile: Carolyn Crandall
cybersecurity, Internet of Things, iot, IoT applications, IoT cybersecurity, IoT network monitoring, iot security, Security threats, Shadow IT

This is the second part in a two-part series. Find the first part here. IoT is far from the only emerging attack surface being targeted and...


October 18, 2019  5:07 PM

Why connected devices aren’t always as smart as you think

Michael Greene Profile: Michael Greene
connected devices, Cyberattacks, Data privacy, Data protection, Internet of Things, iot, IoT cybersecurity, IoT devices, iot security, Security threats

As the holiday shopping season looms on the horizon, sales of connected devices are expected to flourish. From a plethora of intelligent assistants such as smart fitness mirrors and connected doorbells, there is a connected device for you. However, these devices are often a hacker's prime target...


October 9, 2019  2:35 PM

Securing your supply chain is as important as securing your devices

Wayne Dorris Profile: Wayne Dorris
cybersecurity, Internet of Things, iot, IoT cybersecurity, iot security

The Ponemon Institute published its annual report on third-party IoT risks in May, 2019. The report focused on identifying what companies do not know -- or understand -- about the risks inherent to IoT devices and applications, particularly when used by third parties. The report drives home the...


October 8, 2019  3:40 PM

Emerging IoT attack surfaces present attackers with tempting new targets

Carolyn Crandall Profile: Carolyn Crandall
Cyber, Cyber security, Cyberattacks, IIoT security, Internet of Things, iot, IoT cybersecurity, iot security

This is the first in a two-part series. The meteoric rise of IoT has created a popular new attack surface for cybercriminals. The "2019 Sonic Wall Cyber Threat Report" indicated that there were 32.7 million cyberattacks targeting IoT devices in 2018, representing a 217.5% increase over...


October 4, 2019  1:10 PM

Who has control of your control systems?

Anthony Giandomenico Anthony Giandomenico Profile: Anthony Giandomenico
cyber-attacks, Internet of Things, iot, IoT cybersecurity, iot security, IoT strategy

Cybercriminals are constantly probing consumer IoT devices such as home routers, IP cameras and printers to find access points into the network. Once they have access, they can disrupt network functions, gather critical information and deliver malicious payloads. At the other end of the spectrum,...


October 2, 2019  4:57 PM

Medical IoT devices lead to patient safety concerns

Leon Lerman Profile: Leon Lerman
cyber-attacks, healthcare IoT, Hospitality technology, IoT cybersecurity, iot security, patient safety, Ransomware, WannaCry, wireless medical devices

With the recent publicized ransomware and cyberattacks, medical device security has become a hot topic in the boardroom. Senior management is not only concerned about sensitive patient data being leaked. Patient safety is now also at risk.

The organizational challenges of securing medical...


September 26, 2019  11:57 AM

4 ways to minimize IoT cybersecurity risks

Thomas Ryd Profile: Thomas Ryd
cybersecurity, Cybersecurity legislation, Internet of Things, iot, IoT cybersecurity, iot security

With close to 400k followers, the Twitter account named Internet of Shit is the epitome of the dire situation emerging as we stumble into a world of connected devices. Governments around the world are waking up to a reality where the


September 20, 2019  5:06 PM

Secure the mix of legacy and modern solutions in IIoT

Gavin Hill Profile: Gavin Hill
Cyberattacks, IIoT, IIoT network, IIoT security, Internet of Things, iot, IoT cybersecurity, IoT network monitoring

Logistics today is governed by a set of principles called the seven Rs: the right product, the right customer, the right price, the right quantity, the right condition, the right place and the right time. Upholding these principles demands a Herculean effort. Luckily, logistics managers have some...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: