Internet of Things

Happy birthday GDPR: IoT impact and practical tips for compliance
With the GDPR now in its third year, compliance with the EU data privacy regulation is still a significant issue for organizations to tackle, especially especially when it …

Security must become frictionless for companies to fully secure themselves
Ensuring adequate security in the face of a rapid increase in the quantity and sophistication of cyberattacks requires more effort and resources than most organizations are …

How willing are enterprise leaders to use top emerging technologies?
Emerging technologies can bring the potential for increased efficiencies, cost savings and improved security for enterprises, among other benefits—but also risk that must be …

Three smart ways SMBs can improve cybersecurity
Most of us wouldn’t automatically equate small to medium-size businesses (SMBs) with having the most stringent security strategies. For starters, they don’t exactly operate …

The zero trust security market continues to grow
The global zero trust security market is projected to surpass $66,741.3 million, increasing from $18,500.0 million in 2019, at a CAGR of 17.6% from 2020 to 2027 timeframe, …

Commercial third party code creating security blind spots
Despite the fact that third party code in IoT projects has grown 17% in the past five years, only 56% of OEMs have formal policies for testing security, a VDC Research …

Top security threats for power plants and how to proactively avoid them
Power plants are one of the most vitally important components of modern civilization’s infrastructure. A disruption in energy production impacts all aspects of society from …

Cloud compromise now the biggest cybersecurity issue for financial institutions
Infoblox unveils a research into how the COVID-19 shutdowns challenged the financial services industry’s core infrastructure. More than one year into the pandemic, …

Dispelling four myths about automating PKI certificate lifecycle management
The public key infrastructure (PKI) underpins the most effective strategy for securing communications between machines, network and mobile devices, virtual servers, and the …

Healthcare organizations implementing zero trust to tackle cyberattacks
It is widely known that the healthcare industry is a primary target for cyberattack, with increasingly sophisticated and highly-motivated adversaries seeking to exploit both …

APIs in the insurance industry: Accessing a growing world of data
The insurance industry is vast and varied. It can be found in nearly every country in the world, with the earliest references dating back as early as 1750 BC. Modern …

Lack of visibility into IT assets impacting security priorities
Axonius released a report which reveals the extremes to which the pandemic escalated lack of visibility into IT assets and how that is impacting security priorities. According …
Featured news
Resources
Don't miss
- The top CTEM platforms you should know in 2025
- Croatian research institute confirms ransomware attack via ToolShell vulnerabilities
- Microsoft fixes “BadSuccessor” Kerberos vulnerability (CVE-2025-53779)
- Fortinet warns about FortiSIEM vulnerability with in-the-wild exploit code (CVE-2025-25256)
- AWS CISO explains how cloud-native security scales with your business