Search Results | Malware
PREV 1...30   40   50...66   67   68   69   70   71   72   73   74   75...77 NEXT
Sort by:  Most Relevant  |  Date
Shielding valuable IIoT data with VPNs

Blog  The growing use of IIoT worldwide is in the process of turning the concept of smart factories into reality. The phenomenon has been described by observers as the fourth industrial revolution, or Industry 4.0 for short. Industry 4.0 promises to combine digital technologies -- such as big data, data ...

Last updated: Jan 31, 2018   6:15 PM GMT  |  Blog: IoT Agenda   |      Data-security, IIoT, Internet of Things
Securing global ATM networks as attacks in M2M environments rise

Blog  As more and more ATMs become connected to the internet of things, the need to protect communications between disparate ATMs and bank processing centers is critical. Though the first ATM was unveiled 50 years ago, the basic components that make up an ATM have not changed significantly. Many banks sti...

Last updated: Jul 19, 2017   3:57 PM GMT  |  Blog: IoT Agenda   |      ATM, Enterprise IoT, Internet of Things
How mobile operators can bring the smart city to life

Blog  Can you relate to this? You find that one elusive parking spot -- and as you are backing up, another car sneaks in. A study conducted last month in the U.K. found that more than half of British drivers suffer from stress when they cannot find a parking space. Probably all drivers in major towns and ...

Last updated: Oct 31, 2017   6:49 PM GMT  |  Blog: IoT Agenda   |      GATEWAY, Gateways, Internet of Things
The IoT security cheat sheet: What you need to know

Blog  By now, the endless stream of content focusing on the insecurity of IoT devices has become mind-numbing. The security industry has been ringing warning bells since smart devices first started penetrating the market years ago. However, recent activity caused by massive IoT-powered botnets, like Mirai...

Last updated: Apr 6, 2017   3:22 PM GMT  |  Blog: IoT Agenda   |      Internet of Things, iot, iot security
Cybersecurity The local impact inside and out

Blog  The other day, in the article Cyberwar: A consideration for business protections?, we asked a few questions vis--vis cyberwarfare: Outside: What are the modern organizations possible contributions to surrounding outside public enablements and related security there? [Think: electrical ...

Last updated: Feb 12, 2013   4:35 PM GMT  |  Blog: The Business-Technology Weave
Russian cyberwar! Yes, no, maybe so?

Blog  The specter of cyber-warfare has been looming over the Internet since its earliest days. Once people figured out that they could send malicious traffic to remote computers, it was only a matter of time before discussions turned to how this could be useful in the context of military operations. Given...

Last updated: Aug 13, 2008   3:26 PM GMT  |  Blog: Security Bytes
FBI launches Operation Bot Roast II

Blog  The FBI has just announced the results of its latest crackdown on botnet herders, designated Operation Bot Roast II. Since the first crackdown in June, eight people have been indicted, pleaded guilty or been sentenced for botnet crimes. Meanwhile, 13 search warrants were serve...

Last updated: Nov 29, 2007   8:41 PM GMT  |  Blog: Security Bytes
Fighting security FUD

Blog  I recently tripped over a blog write-up from independent analyst Eric Ogren about his irritation with security vendors using FUD to sell products. It's an older posting from 2006 but his message is as relevant today as it was two years ago. Building his case around a threat report Websense released...

Last updated: Apr 17, 2008   2:42 PM GMT  |  Blog: Security Bytes
Magic Quadrant for Network Access Control: Crowded, but leaders stand alone

Blog  Gartner's 2010 Magic Quadrant for network access control (NAC) is remarkably crowded for a market that reportedly generated just $200 million in annual revenue in 2009. Gartner has included 18 vendors in this year's quadrant. For many of these companies, NAC revenue is a drop in the bucket. For othe...

Last updated: Jul 16, 2010   9:49 PM GMT  |  Blog: The Network Hub
The importance of securing the internet of things

Blog  The continued growth of the internet of things and connected devices (Gartner predicts a total of 20.4 billion connected things in use worldwide by 2020) has resulted in an exponential growth in data -- with a promise to make appliances smarter, processes more efficient and life, in general, easier....

Last updated: Jul 30, 2018   8:25 PM GMT  |  Blog: IoT Agenda   |      Blockchain, Consumer IoT, Drones
Seriously Cheap Computing with Linux

Blog  I'm getting ready to update my Linux computer to Ubuntu 12.1. And as I write this, Windows 8 crashes on me! This is not a joke. For real. It happens maybe once a week, which is better than most older versions of Windows. Linux has almost never crashed on me. I mean, maybe once a year over the past 1...

Last updated: Feb 21, 2013   7:29 PM GMT  |  Blog: Cheap Computing
The challenge of transatlantic data security

Blog  US companies that operate in the European Union (EU) need to understand what drives European organisations when it comes to data protection. This applies to both commercial organisations that want to trade in Europe and IT suppliers that need to ensure the messaging around their products and service...

Last updated: Feb 16, 2016   7:47 AM GMT  |  Blog: Quocirca Insights   |      European Union, GDPR, safe-harbour
The ever-growing IoT attack surface

Blog  The theme of a recent Infosecurity Europe 2017 Strategy Talk, facilitated by Quocirca, was how to limit the ability of hackers to exploit the expanding IT attack surface created by the deployment of increasing numbers of IoT (Internet of Things) devices. The two panellists, representing the security...

Last updated: Jul 6, 2017   7:56 AM GMT  |  Blog: Quocirca Insights
Five things to watch at RSA Conference 2017

Blog  RSA Conference 2017 officially kicks off Monday, and once again it will bring several topics, trends and potential controversies to the center of attention of the information security industry. Unlike previous RSA conferences, this year it's been harder to identify one or two major themes heading in...

Last updated: Feb 8, 2017   9:09 PM GMT  |  Blog: Security Bytes   |      iot security, Security
New Zealand vendor making next generation IDS a reality

Blog  Until now some experts have signaled the slow demise of intrusion defense systems, but one firm is having success in the government sector with an IDS appliance that can capture 100% of network traffic. In government circles, its the little, but powerful engine that could. New Zealand firm Enda...

Last updated: May 24, 2010   7:28 PM GMT  |  Blog: Security Bytes
Four reasons to involve IT in IoT

Blog  IoT endpoints have the potential to create tremendous business benefits -- if they're strategically deployed and managed. So, why are 59% of today's enterprise IoT initiatives being planned with little to no IT involvement? An IoT deployment that lacks IT involvement can jeopardize an organization'...

Last updated: Nov 29, 2018   5:10 PM GMT  |  Blog: IoT Agenda   |      automated attacks, cloud, Data
Drop.io: Free, online file sharing made simple, easy and anonymous

Blog  Do you need a simple way to post and share large files on the Web temporarily? Is sending an attachment over email a bad option, for whatever reason? You could try Amazon S3 or FileURLs, both of which offer the ability to transfer files around. You could use the tried and true method of posting to...

Last updated: May 28, 2008   7:10 PM GMT  |  Blog: Our Latest Discovery
Medical IoT devices lead to patient safety concerns

Blog  With the recent publicized ransomware and cyberattacks, medical device security has become a hot topic in the boardroom. Senior management is not only concerned about sensitive patient data being leaked. Patient safety is now also at risk. The organizational challenges of securing medical devices Co...

Last updated: Oct 2, 2019   8:57 PM GMT  |  Blog: IoT Agenda   |      cyber-attacks, healthcare IoT, Hospitality technology
How Cybersecurity Evolves CISO/Security Vendor Relationship? @cynet360

Blog  With any kind of evolution there is a need for realignment, reexamination, change from the existing, or discovery of new. Why is it so? Because a change seeks to change. With the change in the severity of threats and vulnerabilities, there is a need for evolution in cybersecurity. The same old metho...

Last updated: Nov 12, 2019   11:30 AM GMT  |  Blog: Quality Assurance and Project Management   |      CISO, cybersecurity
Next-gen automotive cybersecurity with software-defined perimeter and blockchain

Blog  The emergence of autonomous vehicles is radically changing the automotive business. This change is bringing in new revenue generation opportunities for the whole industry, but with it, also new risks -- specifically cybersecurity. Since autonomous vehicles are completely dependent on connected softw...

Last updated: Dec 14, 2017   5:16 PM GMT  |  Blog: IoT Agenda   |      Blockchain, Connected car, Internet of Things
PREV 1...30   40   50...66   67   68   69   70   71   72   73   74   75...77 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: