IoT Agenda:

Segmentation


April 22, 2019  12:06 PM

Top 5 proactive solutions to IoT security challenges

Ofer Amitai Profile: Ofer Amitai
Internet of Things, iot, IoT devices, IoT discovery, IoT legislation, IoT management, IoT regulations, iot security, NAC, network access control, Network monitoring, network visibility, security breach, Segmentation, visibility

A couple of years ago, an employee was fired from a position with a large food retailer in the United States. This event might have gone unnoticed had it not been for the fact that this disgruntled employee decided to get even. He knew the password to the organization's wireless network and...

April 15, 2019  12:48 PM

Securing the IoT edge

John Maddison Profile: John Maddison
Authentication, credentials, Edge computing, edge security, firewall, intent-based segmentation, Internet of Things, iot, IoT communications, IoT devices, IoT edge, IoT encryption, iot security, network access control, securing IoT, Segmentation

The network has undergone a remarkable amount of change over a remarkably short period of time. The clearly defined perimeters of traditional networks have been eroded away by BYOD, mobile computing, migration to the cloud, IoT adoption and the new WAN edge. Of course, this sort of evolution is...


March 5, 2019  1:21 PM

Combatting the continued expansion of IoT threats

Anthony Giandomenico Anthony Giandomenico Profile: Anthony Giandomenico
botnets, Internet of Things, iot, IoT botnet, IoT networking, iot security, malware, securing IoT, Segmentation

The expanding threat landscape resulting from the convergence of cyber and physical systems is providing cybercriminals with additional entry points into the corporate network. This is not going unnoticed by cybercriminals. The Fortinet


January 17, 2019  1:51 PM

Taking back network control in the IoT era

Reggie Best Profile: Reggie Best
device discovery, Internet of Things, iot, IoT devices, iot security, IT, network segmentation, network visibility, OT, securing IoT, Segmentation

One of the biggest mistakes organizations make when it comes to security is falsely believing that the internet of things is the future, rather than understanding that it is, in fact, the present. We already have numerous IoT devices on our corporate networks -- they've just been flying under the...


January 11, 2019  12:35 PM

Looking ahead: Security implications of 5G and IoT

Jonathan Nguyen Duy Profile: Jonathan Nguyen Duy
5G, 5G and IoT, 5G security, Access control, Authentication, Digital transformation, Edge computing, edge computing security, Internet of Things, iot, IOT Network, iot security, IoT wireless, network segmentation, Segmentation

The advent of 5G networks is about much more than just incredibly fast speeds and more reliable connections. When combined with today's powerful edge devices -- whether consumer-grade smart devices or the new generation of industrial-grade IoT devices -- the impact of 5G on business and networking...


November 15, 2018  10:30 AM

Mobile and IoT threats during the holiday season

Anthony Giandomenico Anthony Giandomenico Profile: Anthony Giandomenico
device inventory, Internet of Things, iot, IoT attacks, IoT botnet, IOT Network, iot security, Mirai, NAC, retail IoT, securing IoT, Segmentation

As the holiday season approaches and more and more consumers begin shopping, comparing prices, and researching gifts online, cybercriminal efforts are expected to accelerate. Retailers and others offering connectivity to their customers need to pay particular heed to their wireless access points,...


September 28, 2018  3:56 PM

Securing IIoT requires extra care. NAC and segmentation can help

Peter Newton Profile: Peter Newton
IIoT, Industrial IoT, iot, IoT devices, iot security, NAC, Network access control (NAC), Operational technology, security in IOT, Segmentation, worms

As IT and operational technology networks converge, organizations are exposing their traditionally isolated OT networks to new cyber-risks. Cybercriminals have already begun designing new malware threats, like


September 18, 2018  4:06 PM

Navigating the IoT security minefield: Hardware security

Andrew Useckas Profile: Andrew Useckas
Communications security, credentials, Firmware, firmware update, Hardware security, Internet of Things, iot, IoT devices, IoT hardware, iot security, Segmentation

In my first article in this series, I highlighted just how difficult IoT security can be due to the plethora of hardware and operating systems on which those systems...


August 31, 2018  12:55 PM

Cryptojacking infections are coming from inside your home

Anthony Giandomenico Anthony Giandomenico Profile: Anthony Giandomenico
Access control, Botnet, Consumer IoT, cybercriminals, cybersecurity, Enterprise IoT, Internet of Things, iot, IoT devices, iot security, Segmentation

Cryptojacking has become a growing concern. Cybercriminals aren't satisfied with the available supply of vulnerable servers and PCs to hijack in order to mine their favorite cryptocurrency. So, they have added another rich source...


May 2, 2018  2:12 PM

Five tips for tackling the internet of shadowy things

Ojas Rege Profile: Ojas Rege
Enterprise IoT, Internet of Things, iot, IoT devices, iot security, NAC, Network security, PKI, Segmentation, Telnet

The internet of shadowy things sounds like a shady place to be, and it is. In the past, shadow IT was a nightmare for most enterprises -- it was known for being outside of IT's control with a plethora of security issues. However, with the influx of mobile within the enterprise, this mindset has...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: