YOU ARE AT:Security

BROWSING: Security

IoT security attacks: a timeline of the internet of things’ darkest hours

IoT security, a worrisome past IoT security is a bit of a conundrum – the only time it gets the coverage it deserves is when it has failed, or is in the process of doing so. It is important to find the silver lining to...

IoT industry must be proactive about ethical data use

Panel discussion: the Internet of Things (IoT) industry has a unique opportunity to enforce ethical data use right from the start. The billions of things that are expected to get connected will generate massive volumes of data. Making sense of that data will be key...

Microsoft launches security program for Azure IoT

Microsoft presented updates to its cloud-based Internet of Things suite, Microsoft Azure IoT, including a security program. Internet of Things (IoT) devices are under increased scrutiny following massive distributed denial of service (DDoS) attacks in the past few weeks, including one which took down Netflix,...

SME´s need to take precaution as health data breaches increase – an opportunity to companies protecting data

Health data breaches has been on the increase for some years now and 2015 was a record year with more than 1 out of 3 Americans having their data compromised. However, as people in the law enforcement and companies offering data security solutions witness...

Bastille releases IoT security solution to protect enterprises from attacks

Bastille, an enterprise IoT security company, announced the availability of its new service to protect internet of things enterprises from information and security threats. Bastille’s solution uses software-defined radio sensors backed by machine-learning technology to provide enterprises with visibility into mobile, wireless and IoT security....

Looking beyond fingerprint sensors: ways to enhance smartphone security

The Motorola Atrix 4G was the first smartphone with a fingerprint scanner for quicker, more secure log in authentication. But the security feature's widespread use came about when Apple introduced it in its iPhone 5s back in 2013. Since then, Snapdragon-powered Android phones have...

Endpoint protection strategy lacking in two-thirds of enterprises

Despite the proliferation of endpoints, only a third of enterprises have an endpoint protection strategy, a new survey reveals. The number and nature of critical endpoints in enterprise networks is evolving as employee-owned devices, virtual machines, point-of-sale terminals, Internet of Things (IoT) devices and servers...

CSA releases guidelines for securing IoT products

Amid growing concerns about IoT devices being used for cyber attacks, the Cloud Security Alliance (CSA) released a 13-step guide for securing IoT products. Internet of Things (IoT) devices were recently used in two massive distributed denial of service attacks (DDoS) one against security expert...

Hacked IoT devices behind largest DDoS attack to date

An army of hacked IoT devices was used to conduct the two largest DDoS attacks to date. Security experts have warned time and again that hacked IoT devices could cause serious security damage. Now might be a good time for IoT device makers and IT departments...

Majority of IoT security attacks originate in China, U.S.

IoT devices are increasingly used for DDoS attacks and a majority of these IoT security attacks originate in China and the U.S. Internet of Things (IoT) devices are increasingly being used for carrying out IoT security attacks, in particular distributed denial of service (DDoS)...

IIC releases official framework for industrial IoT security

Securing the industrial IoT  The Industrial Internet Consortium (IIC), an organization formed to accelerate the industrial internet of things (IIoT), today published the Industrial Internet Security Framework (IISF), a common IoT security framework that addresses security issues in industrial systems. The IISF emphasizes the importance of five...

Cisco and Zones protect beer with connected distribution center

Saving money and creating a connected beer center Del Papa is a beer distribution company founded more than a century ago, and the company today distributes 10 million cases of beer annually from 30 suppliers. More than 375 employees work at their headquarters in Texas City,...

How industrial IoT is transforming public safety

How the internet of things is improving public safety A blend of industrial IoT sensors and consumer devices are being used to enhance public safety and give critical visibility to law enforcement. Here are some public safety use cases for internet of things innovations. The cloud offers predictive policing Predictive policing...

Here is what companies are doing to secure the IIoT

IIoT security: critical importance, under-addressed The industrial internet of things presents a cybersecurity concern of a scale we have never before seen. Its premise alone – making every "thing" around us connected to a network – is enough to spur the imagination of entire environments...

Considerations and approaches to securing the IIoT

The dangers of an insecure IIoT system Wired detailed the frightening consequences of vulnerable computer-based systems in its 2008 article Industrial control systems killed once, and will again, experts warn. With the expansion of “smart devices” into the automobile and medical industries, those predictions are more...

Energy versus security–the IoT tradeoff

Enterprises harnessing the IoT will need to strike a careful balance between security and power consumption Amid all the buzz about the arrival of low power wide area (LPWA) connectivity and IoT devices that can function for a decade on a single battery charge, there...

IoT security to drive funding in cybersecurity startups

IoT security spending is set to increase by nearly 30% this year. Cybersecurity startups to benefit from surge in investment as funding is expected to soar. "Internet of Things" security spending is currently a relatively small market, but analyst firm Gartner estimates worldwide spending on...

IIoT security: UK manufacturers at risk from cyber threats

The lack of IIot security investments could put UK manufacturers at risk from cyber threats. A majority of UK manufacturers, 62 percent, have plans to increase their investments in internet-connected capital equipment in the next five years as they transition to industry 4.0. However, investment plans...

Live Webinar: Industrial IoT – Designing, Testing & Securing the Next Mega-Trend

Goldman Sachs views IoT as the third “internet” wave while predicting that IoT will exceed preceding internet waves by connecting 28 billion “things”. By extending mobile and wireless “pipes”, IoT will unlock product innovation, create new business models and expose networks to unprecedented level...

IoT data connectivity, system integrators, dev kits

https://youtu.be/MvTYlAw0uQ4 Today's IoT Innovation episode brought to you by Anritsu and Telecomcareers IoT pundits and experts, Chris Hare and Steve Brumer, join host Jeff Mucci for a rousing discussion on IoT trends and news. Specific topics include: "Internet of data versus 'Internet of Things,'" a term first...

IoT security, licensed vs. unlicensed, development kits

https://www.youtube.com/watch?v=4dmHck4HoBA This week on on IoT Innovation, UltraSOC CEO, Rupert Baines, joins host Jeff Mucci, for a thoughtful discussion on the following top IoT trends: • IoT Wireless Network Wars - Licensed versus unlicensed IoT network connectivity. Specifically, how long range, low power (ie Sigfox, LoRa, Silver...

IoT security: More connections means more concerns

WASHINGTON – As the "Internet of Things" becomes a staple of the conversation across all aspects of the economy, there’s a growing concern around how to secure all these new connections.  At the recent Federal Building Council event, many participants analogized that creating an IoT network is...

Hacking the connected car: security in the age of IoT

A well-publicized hack of a 2014 Jeep Cherokee earlier this year by security experts working with Wired magazine resulted in the recall of 1.4 million vehicles by Fiat-Chrysler Automobiles, a hasty (and successful) network-level fix pushed out by Sprint to address the vulnerability, and...

US government IoT policy lags: industry IoT leading charge

How does US government IoT policy stack up with the rest of the world?  According to IoT Pioneer Kevin Ashton, and other sources, US government lagging behind China, Germany, EU and soon to be S. Korea America Last? is the title of an article Kevin...