Search Results | Malware
PREV 1...30   40   50...68   69   70   71   72   73   74   75   76   77 NEXT
Sort by:  Most Relevant  |  Date
3121 brings social networking and security challenges to Capitol Hill

Blog  By this point in 2009, most online users know about online social networking platforms like Facebook. Business users have seen many attempts to bring social networking and other Web 2.0 features within the enterprise, all of which are generally classified under the enterprise 2.0 label for social so...

Last updated: Sep 17, 2009   9:02 PM GMT  |  Blog: IT Compliance Advisor
IoT security from the outside in and inside out

Blog  The internet of things is a confusing concept. It implies that interconnecting devices is a new concept (it's well worn), IoT devices are always connected to the internet (they're not), and the center of attention is the IoT device (it's not). IoT is about converting data to action by extracting and...

Last updated: Oct 11, 2016   4:19 PM GMT  |  Blog: IoT Agenda   |      Data Management, Encryption, Enterprise mobility
DHS Plans to Delete Surveillance Data. Are We Glad or Not?

Blog  The Department of Homeland Security announced, in a very low-key way, on November 19 that it was planning to delete "Master files and outputs of an electronic information system which performs information technology infrastructure intrusion detection, analysis, and prevention." It gave people until ...

Last updated: Dec 1, 2014   0:48 AM GMT  |  Blog: Yottabytes: Storage and Disaster Recovery   |      privacy, Security
How IoT will change auto insurance

Blog  To determine policy premiums, auto insurers have traditionally used factors such as driving record, vehicle usage and insurance history. This is in addition to outside variables like customer location (collision/theft rates in the area), age and gender (teen males tend to have higher rates), and non...

Last updated: May 22, 2017   8:05 PM GMT  |  Blog: IoT Agenda   |      "car insurance", Consumer IoT, Cyberinsurance
Stuxnet details should prompt call to action over cyberwarfare impact, not words

Blog  Security experts have warned about the potential problems caused by military cyberstrikes. Experts say cyberwarfare is difficult to plan and worse, it puts innocent people at risk. Stuxnet was part of a secret joint U.S.-Israeli cyberattack operation which began with approval by the Bush Administra...

Last updated: Jun 1, 2012   7:12 PM GMT  |  Blog: Security Bytes
The importance of trust in the machine economy

Blog  Thirty years ago, we did not have cell phones. The most advanced people were beginning to get "car phones." Those were so cool. They drew from the car's power supply and had the little antenna on the back of the car that showed everyone how impressive you really were. Most communications were from l...

Last updated: May 16, 2018   2:23 PM GMT  |  Blog: IoT Agenda   |      Blockchain, DLT, Internet of Things
Trusted execution environments: What, how and why?

Blog  The TEE is no longer an emerging technology. If you've ever used apps like Samsung Pay or WeChat Pay, device features like Samsung KNOX/Secure Folder, or many of the leading Android device makers' flagship phones, then you've been protected by one. But it is not a technology that is confined to high...

Last updated: Apr 18, 2018   6:11 PM GMT  |  Blog: IoT Agenda   |      Authentication, identity, Internet of Things
The unlikelihood of 'IoT, secure by design,' and what we can do about it

Blog  The concept "secure by design" focuses on a number of recommendations to make IoT devices more secure. The most important of these recommendations is an ability for the user to update the firmware on these devices. Unfortunately, this recommendation does not go far enough, as evidenced by user behav...

Last updated: Sep 7, 2018   4:45 PM GMT  |  Blog: IoT Agenda   |      Automatic Updates, Botnet, DYN
Create a Custom ISO for Windows 10 -- Part 4 of 6

Blog  By Kari the Finn, guest blogger for Ed Tittel, courtesy of Note: this blog is Part 4 in a series of 6 parts on the topic of using Sysprep to craft a custom ISO for use in installing Windows 10, aimed at the upcoming Creator's Update scheduled to become available in mid to late April. ...

Last updated: Mar 22, 2017   7:18 PM GMT  |  Blog: Windows Enterprise Desktop
Does Google's privacy policy inspire you with confidence in their on-line world?

Blog   A recent posting on The Drum illustrates Google's dominance of the on-line world. A five minute outage last Saturday apparently led to a drop of 40% in overall traffic. It was a Saturday and the time of day is not given but it illustrates how thoroughly the Internet is dominated by a handful of US-...

Last updated: Aug 19, 2013   11:01 PM GMT  |  Blog: When IT Meets Politics   |      abuse, advertising, Amazon
California's new IoT security law: Inching toward a safer future

Blog  The internet of things is becoming increasingly ubiquitous in American society. Smart home devices control our lighting, heating and entertainment systems. Health monitoring devices alert caregivers the moment medical issues arise. IoT-connected vehicles are now commonplace. Even traffic patterns an...

Last updated: Nov 8, 2018   3:25 PM GMT  |  Blog: IoT Agenda   |      Authentication, Botnet, DDOS
The security and visibility of critical national infrastructure: ViaSat's mega-SIEM

Blog   There has been plenty of talk about the threat of cyber-attacks on critical national infrastructure (CNI). So what's the risk, what's involved in protecting CNI and why, to date, do attacks seem to have been limited?   CNI is the utility infrastructure that we all rely on day-to-day; nationa...

Last updated: Jul 29, 2014   8:24 AM GMT  |  Blog: Quocirca Insights   |      LogRhythm, McAfee, SIEM
Protecting the modern infotainment system

Blog  Whether you are glancing at GPS prompts, connecting to your favorite streaming satellite music station or using Bluetooth in conjunction with a dizzying number of apps available on your smartphone, the infotainment system in your car is largely innocuous and inconspicuous -- at least in the grand sc...

Last updated: May 13, 2019   5:37 PM GMT  |  Blog: IoT Agenda   |      Buffer overflow, car security, Connected car
Beyond updates: The need for platform security in IoT

Blog  Just 10 years ago, the idea of an interconnected world seemed like a bit of near-future fiction. But the convergence of a number of technologies -- including Bluetooth communication, smartphone availability, analytics and machine learning, and cloud-based servers -- has brought this vision close to ...

Last updated: May 16, 2018   5:55 PM GMT  |  Blog: IoT Agenda   |      Blockchain, Data-security, DLT
Seizing the benefits of AI and IoT through data security

Blog  As artificial intelligence and IoT applications are becoming more prominent, businesses must consider how to best process and analyze such data. Think of the countless business efficiencies and consumer-centric conveniences that have been offered up by the connected home or smart city. However, this...

Last updated: Jun 12, 2018   4:39 PM GMT  |  Blog: IoT Agenda   |      ai, Artificial intelligence, Cryptography
Secure e-voting: 20 to 30 years away

Blog  Jeremy Epstein, senior computer scientist at non-profit research institute SRI International spoke to the Computer Weekly Developer Network blog this week to share his views on the possibility of electronic voting security. Epstein says that although some e-voting is happening in the US, Estonia an...

Last updated: May 4, 2015   4:04 PM GMT  |  Blog: CW Developer Network   |      Uncategorized
Where are security and data governance in IoT?

Blog  IoT Back to Basics, chapter 3: Its no surprise that security and governance are important considerations when it comes to the IoT, but quite how incredibly important they are may not be immediately obvious. Ensuring that users of IoT systems and smart devices remain safe and secure which req...

Last updated: Feb 22, 2018   1:45 PM GMT  |  Blog: Write side up - by Freeform Dynamics   |      attacks, Data governance, Hackers
Face-Off: VMware vs. Microsoft in the hypervisor wars

Blog   The great virtualization debate: VMware vs. Microsoft Ken Cline and Dave Sobel take sides in the hypervisor wars. Ken Cline I hear the sabers rattling already! The selection of a hypervisor borders on religion -- and with good reason. The hypervisor you choose to deploy in your dat...

Last updated: May 1, 2009   2:04 PM GMT  |  Blog: The Virtualization Room
For cybercriminals, IoT devices are big business, part two

Blog  In part one of this article, Anthony Giandomenico described how cybercrime has become not only a business, but a big business, designed to generate revenue with predesigned attacks focused on attack vectors that are easy to exploit: IoT devices. Opportunity is also the land of innovation Because cyb...

Last updated: Aug 17, 2017   3:41 PM GMT  |  Blog: IoT Agenda   |      cybercriminals, cybersecurity, Internet of Things
Can Germany really ban hacking tools?

Blog  This week's Security Blog Log roundup starts with Germany's stunning move to ban hacking tools. I use the word stunning because I don't see how any government could possibly enforce such a thing. According to The Register, Germany is updating its criminal code to define denial-of-service attacks an...

Last updated: Jun 1, 2007   8:56 AM GMT  |  Blog: Security Bytes
PREV 1...30   40   50...68   69   70   71   72   73   74   75   76   77 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: