Search Results | Malware
PREV 1...30   40   50...68   69   70   71   72   73   74   75   76   77 NEXT
Sort by:  Most Relevant  |  Date
How manufacturers, service providers, consumers can improve IoT security

Blog  Security is one of the greatest threats facing any business today, and this threat is compounded for companies producing, supporting or leveraging connected devices. Data transmission between devices can drive tremendous efficiency increases, from supply chain automation to software updates, to self...

Last updated: Jan 30, 2017   7:16 PM GMT  |  Blog: IoT Agenda   |      Authentication, Internet of Things, iot
Hands-on: BlackBerry KEYone Android smartphone

Blog  Is this the phone loyal BlackBerry fans have been longing for? Inspect-a-Gadget goes hands-on with the BlackBerry KEYone, a super-secure Android smartphone with a trademark physical keyboard. Although BlackBerry called time on its plummeting hardware business in September 2016,a licensing deal ...

Last updated: Apr 27, 2017   3:25 PM GMT  |  Blog: Inspect-a-Gadget   |      Android, Android security, BlackBerry
Whither Cyber Security

Blog   I'm back blogging after a lengthy break due to extensive writing and consultancy commitments. Nothing much has changed in the cyber security sphere during that time apart from a very slight broadening of public concern as citizens became a little more aware that their information systems are vulner...

Last updated: Jun 29, 2013   10:29 PM GMT  |  Blog: David Laceys IT Security Blog   |      Security management
HP: Putting Print Security on the CISO Agenda

Blog   Amidst a rapidly evolving threat landscape, where malware and exploits continue to proliferate, endpoint security often fails to adequately protect networked printer and multifunction printer (MFP) devices. With its new enhanced LaserJet enterprise printer range, announced on 22 September 2015, HP ...

Last updated: Sep 29, 2015   10:44 AM GMT  |  Blog: Quocirca Insights   |      HP, MPS, print
Securing the Internet of Things - time for another look at Public Key Infrastructure (PKI)?

Blog  The Internet of Things (IoT) is a broad area that is attracting much discussion. Wikipedia starts its IoT definition as follows: the network of physical objects or "things" embedded with electronics, software, sensors, and connectivity to enable objects to exchange data with the manufacturer, ope...

Last updated: Aug 4, 2015   7:12 AM GMT  |  Blog: Quocirca Insights   |      Encryption, Internet of Things, iot
Making connected cars a successful reality for developers and manufacturers

Blog  Welcome to the final post in this three-part series where we've been looking at the disconnect between developers and car manufacturers, and the roles played by each group. In this post, I'll discuss the challenges still left in this delicately balanced ecosystem and the future of connected vehicles...

Last updated: Mar 21, 2019   1:24 PM GMT  |  Blog: IoT Agenda   |      "Automotive industry", app developers, app development
Securing the IoT edge

Blog  The network has undergone a remarkable amount of change over a remarkably short period of time. The clearly defined perimeters of traditional networks have been eroded away by BYOD, mobile computing, migration to the cloud, IoT adoption and the new WAN edge. Of course, this sort of evolution is norm...

Last updated: Apr 15, 2019   4:48 PM GMT  |  Blog: IoT Agenda   |      Authentication, credentials, Edge computing
Fog computing brings new business opportunities and disruptions

Blog  Since the early 2000s, cloud computing has played a dominant role in enabling the many applications we rely on in our daily lives and business operations. However, as the internet of things continues to gain traction, cloud computing alone becomes increasingly inadequate. Many emerging applications ...

Last updated: Apr 11, 2017   2:23 PM GMT  |  Blog: IoT Agenda   |      Cloud Computing, Cloud networking, FOG
Making IoT more developer-friendly for the greater good of humanity

Blog  Developers today face similar challenges with the internet of things that they did at the peak of the dot-com boom. In the late 1990s and early 2000s, a variety of solutions had been introduced to facilitate machine-to-machine networking. They had names like CellNet, Hexagram and Whisper; and today ...

Last updated: May 17, 2017   4:14 PM GMT  |  Blog: IoT Agenda   |      Enterprise IoT, Internet of Things, iot
Four Essential Free Productivity Programs for Windows 8

Blog  [caption id="attachment_60" align="alignleft" width="250"] Windows 8 With Classic Shell Desktop[/caption] I say "Windows 8" in this post's title because Microsoft is determined to have you use Windows 8. If you buy a new computer in 2013 or beyond, it will have Windows 8 installed instead of an ear...

Last updated: Oct 15, 2012   8:53 PM GMT  |  Blog: Cheap Computing
Use cafe Wi-Fi, face a felony charge

Blog  Having done my share of Web browsing in various Starbucks Coffee shops, I found this item in Jeff Hayes' Security Blog as sobering as a double shot of espresso. It's about a guy who was slapped with a fine for doing something most of us have done before -- using a cafe wireless hot spot. He wasn't ...

Last updated: Jun 15, 2007   9:25 AM GMT  |  Blog: Security Bytes
Today's PKI is purpose-built and ready for IoT

Blog  As connected devices become common throughout a wide range of industries, it should come as no surprise that we are reading about the increasing frequency of attacks targeting IoT devices and systems. Particularly alarming are the facts that many of these attacks are now targeting devices linked to ...

Last updated: Apr 9, 2019   6:00 PM GMT  |  Blog: IoT Agenda   |      attack detection, attack prevention, Authentication
Top four considerations when securing the multi-cloud environment

Blog  This is a guest post byStephen Dane, managing director for cyber security at Cisco Asia-Pacific, Japan and Greater China We live in a multi-cloud world. A world where a multitude of offerings from cloud service providers (CSPs) gives us the potential to respond to business opportunities and chall...

Last updated: Aug 22, 2019   7:28 AM GMT  |  Blog: Eyes on APAC
Securing your supply chain is as important as securing your devices

Blog  The Ponemon Institute published its annual report on third-party IoT risks in May, 2019. The report focused on identifying what companies do not know -- or understand -- about the risks inherent to IoT devices and applications, particularly when used by third parties. The report drives home the fact...

Last updated: Oct 9, 2019   6:35 PM GMT  |  Blog: IoT Agenda   |      cybersecurity, Internet of Things, iot
Can the cloud cure IoT security problems?

Blog  The cloud has made deploying servers easy and taken much of the complexity out of application delivery. Now, it will face its next challenge: rescuing the internet of things from itself. By any measure, IoT is big business. Last year, global IoT spending reached $737 billion, according to IDC, and ...

Last updated: Nov 10, 2017   6:42 PM GMT  |  Blog: IoT Agenda   |      cloud, Cloud Services, Internet of Things
Social Networking and the Blended Environment: What is being done in the name of your domain?

Blog  David Scott, author of IT Wars and a business consultant, knows first hand the risks social networking can pose to the enterprise through his work with clients who've faced these very threats. But how does IT fit into it? The following guest post offers some strategies on where your IT department fi...

Last updated: Jan 29, 2010   4:25 PM GMT  |  Blog: Enterprise IT Watch Blog
What is the future of the Internet?

Blog  Do you think much about the future of the Internet? Last week, the academics and technologists who consider the matter professionally gathered at the Berkman Center at Harvard Law School in Cambridge, Massachusetts to hail ten years of achievement in cyberlaw and digital activisim . Check out this...

Last updated: May 19, 2008   3:29 PM GMT  |  Blog: Our Latest Discovery
How to Recognize and Avoid Email Scams - Part 3

Blog  In Part 2 I gave you some real examples of common email scams and some analysis to help you recognize them. In this, the final installment, we'll explore Trojan horse emails, phishing scams, and the Nigerian 419 scam. I'll also leave you once again with the US-CERT tips on how to avoid the common sc...

Last updated: Jul 11, 2010   9:54 PM GMT  |  Blog: Security Corner
The future of DNA based security clearance?

Blog   "A Fine Balance", the joint conference of four Knowledge Transfer Networks in Thursday provided an excellent update on the current state of "privacy enhancing technologies". When I introduced the Earl of  Erroll I made the point that the Lord High Constable of Scotland was not o...

Last updated: Nov 30, 2008   9:44 AM GMT  |  Blog: When IT Meets Politics   |      BOMP, CICS, E-Immodium
How to stop our smart homes from turning against us

Blog  The Internet of Things is transforming our homes into data centers before our very eyes. Yet unlike in the data center, we dont have IT professionals on call to manage, patch and secure these systems. Already in 2016, there are reports of LG Smart TVs being targeted by scareware. And just recentl...

Last updated: May 31, 2016   5:27 PM GMT  |  Blog: IoT Agenda   |      Internet of Things, iot, iot security
PREV 1...30   40   50...68   69   70   71   72   73   74   75   76   77 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: