YOU ARE AT:TagsSecurity

BROWSING: Security

Preventing IoT Edge Device Vulnerabilities

  Security issues around IoT edge devices are rarely mentioned in literature, however, the projected billions of IoT edge devices out in the wild makes for a vast attack surface. Should hardware designers be concerned about security for IoT edge devices? And, is it worth...

IIoT security: The top 10 security vulnerabilities

And how the industry is failing to learn from its mistakes The technology industry is failing to learn from its mistakes, as familiar security failings from the IT space hobble the nascent internet of things (IoT) market, and threaten its growth. A glance at top...

How to patch security holes

What are security holes? Applying patches to operating systems is pivotal to network security. A software vulnerability is typically a security hole discovered in an operating system or software program, which hackers target with a specific code clothed as malware. In the interest of taking...

Nokia taps automation to help operators fight ransomware

Smartphones are responsible for the majority of mobile network infections, and most infected smartphones are running Android applications, according to Nokia. The company tracks ransomware through its threat intelligence lab and has used the data gathered to develop new software to fight ransomware. Nokia...

Despite ongoing enhancement, cybersecurity risks continue to encroach

  Cybersecurity breaches are a much talked about but little-addressed problem for corporations today, as every hack reveals just how hard it is to stay ahead of a technically savvy, often criminal element. In fact, the problem is so extensive that a recent study by...

Rethinking privacy in the age of Internet intimacy (Reality Check)

  Our desire for privacy is part of what makes us human. None of us likes to have our privacy invaded, whether from someone reading over our shoulder or a data breach. Every day we read stories about foreign government hacks and ads that follow...

IoT security is critical, hard, achievable: 3 best practices for today’s networks (Reader Forum)

The rapid adoption and deployment of IoT devices is a significant contributor to digital transformation. To compete in the new digital marketplace, organizations must monitor and manage critical network and system components in real time, and create algorithms to extract meaningful information from the Big...

Panasonic focuses on cybersecurity for autonomous cars

The Japanese firm said the system detects and prevents cyber attacks in connected and autonomous cars Panasonic Corporation announced the development of an automotive intrusion detection and prevention systems to prevent cyberattacks in autonomous and connected cars. Panasonic said its newly developed system will ensure safe...

Three steps you can take now for more secure mobile IoT (Reader Forum)

The Cisco Visual Networking Index reports that almost half a billion (429 million) mobile devices and connections were added in 2016. Smartphones made up the bulk of this growth, followed by M2M modules. These devices, self-driving cars, mobile-connected tablets and more comprise the mobile internet...

Which companies are most vulnerable to IoT hacks?

Mid-size companies are embracing the internet of things, but are not always implementing security measures to protect their data. One in eight has been the victim of a cyber attack related to the IoT, according to a new study commissioned by Arctic Wolf, a...

HPE software business completes $8.8 billion Micro Focus merger

HPE and Micro Focus merge to create world’s seventh largest software vendor Hewlett Packard Enterprise (HPE) announced it completed a $8.8 billion spin-off and merger with U.K. software businesses Micro Focus Friday, claiming to now be seventh-largest software vendor in the world. The companies will...

Verizon secures its virtual network services with Check Point

Verizon expands its software-defined ecosystem by integrating another security tool Verizon Communications is offering another security component to its virtual network services platform with the addition of Check Point Software Technologies. Verizon has become more and more concerned with securing its virtual service line, and it’s...

Kaspersky Lab launches IoT scanner

The IoT launch occurs while the FBI is reportedly urging U.S. firms to stop using Kapersky Lab’s security solutions Kaspersky Lab has released a beta version of its solution for the smart home and the internet of things (IoT) - Kaspersky IoT Scanner. This free...

Which team member is your company’s biggest mobile security risk? (Reality Check)

The workforce of the future will be more mobile than ever. By 2020, 40% of the global workforce will be mobile. In the U.S. and Europe, that number will soar to 75%. The changing composition of the modern workforce accelerates the need for mobile...

Stages of a cyber attack

Virtual networks: a bullseye for hackers Virtualization of networks are on the rise as are cyber attacks. According to a report by FireEye and Mandiant, approximately 97% of organizations have had at least one hacker bypass there defense architecture. Moreover, network security devices like next...

Congress tries to legislate IoT security

In an effort to protect the U.S. government from hackers, a group of senators has introduced a bill that would legislate specific security measures for all connected hardware purchased by government agencies. The bill is called the Internet of Things (IoT) Cybersecurity Improvement Act...

SoftBank subsidiaries partner with Rambus for IoT security

Security solution could enhance SoftBank's growing portfolio of IoT investments SoftBank Technologies is partnering with Rambus in an effort to bolster IoT security and device management. Rambus makes semiconductors and IP cores for memory chips, security solutions, smart sensors and lighting products. The company said...

Top 3 smart cities in APAC

The Asia Pacific (APAC) region has several smart cities under development, mainly grouped in countries such as China, Japan, South Korea and Singapore. Here we describe three of the region’s most developed smart city projects. Yinchuan The city of Yinchuan, China, is known to be the...

How to secure the IoT

More than 50 billion devices are predicted to be used by consumers by the year 2020, according to industry analysts and high-tech companies. However, this forecasted boom in the internet of things (IoT) will require the implementation of security measures to protect the entire...

Embedded IoT design: six best practices

Embedding sensors, connectivity and compute capabilities into assets that have never before been connected to the internet is difficult. Enterprise IoT Insights spoke with analysts, chip developers, wireless carriers and module makers to learn about some of the best practices identified by these companies....

Keysight and Ixia: “It’s a good fit”

Keysight acquisition presents a new path for Ixia Almost three years after Bethany Mayer took the helm at Ixia, the company has been acquired by Keysight Technologies. The $1.6 billion transaction closed in April, and now the former Ixia CEO will be using her experience...

IoT security: will today’s methods work?

Researchers from the University of Michigan and Stony Brook University have published a paper calling for new security mechanisms for the internet of things. The authors say that some security challenges presented by the IoT can be solved using traditional approaches, and some require...

IoT security: will today’s methods work?

Researchers from the University of Michigan and Stony Brook University have published a paper calling for new security mechanisms for the internet of things. The authors say that some security challenges presented by the IoT can be solved using traditional approaches, and some require...

Study: 48% of U.S. firms using IoT hit by security breaches

The report also showed that IoT breaches can cost up to 13% of the smaller firms´ annual revenues Nearly half of U.S. firms using an internet of things (IoT) network have been hit by a recent security breach, according to a study by consulting firm...