Internet of Things

One in four people use work passwords for consumer websites
Employees working from home on a company-provided computer are demonstrating a clear lack of cybersecurity knowledge through high-risk behavior, according to a report released …

The cybersecurity issues of seismic monitoring devices
Seismic monitoring devices linked to the internet are vulnerable to cyberattacks that could disrupt data collection and processing, say researchers who have probed the devices …

Vulnerabilities in widely used TCP/IP stacks open IoT, OT devices to attack
Forescout researchers have discovered nine vulnerabilities affecting nine different TCP/IP stacks widely used in IoT and OT devices. The vulnerabilities are due to weak …

Empowering a remote workforce is a top priority for CEOs
A top challenge for many CEOs over the next few years is managing a remote workforce, a new IBM Institute for Business Value (IBV) study reveals. CEOs of outperforming …

Global IoT in manufacturing market size to reach $1.0388 billion by 2026
The global IoT in manufacturing market size is projected to reach $1.0388 billion by 2026, from $567.2 million in 2020, according to Valuates Reports. Major factors driving …

Worldwide SD-WAN market to reach valuation of $53 billion by end of 2030
A software-defined wide area network is a type of computer network that allows the bounding of multiple internet access resources, such as cables, digital subscriber lines …

Minimizing cyberattacks by managing the lifecycle of non-human workers
The number of non-human workers is growing, particularly as global organizations increasingly prioritize cloud computing, DevOps, IoT devices, and other digital transformation …

Healthcare IT teams battle with technical challenges to ensure network resilience and security
IDG surveyed IT leaders from hospitals, primary and urgent care facilities, pharmaceutical companies, and other healthcare entities. The goal was to shed light on how …

Addressing the lack of knowledge around pen testing
The vast majority of attackers are opportunist criminals looking for easy targets to maximize their profits. If defenses are sufficiently fortified, finding a way through will …

Securing the connected home: A joint task for homeowners and their ISP
As COVID-19 spread over the world and nations and businesses adapted to minimize citizens’ and employees’ personal interactions to help contain the infection, a …

Advancement of 5G and IoT tech to help the electronic test and measurement market
The advancement of 5G and the implementation of IoT technology will help the global electronic test and measurement market reach $18.94 billion by 2025, despite a slight …

The 5G toolbox of defense
For the mobile communications industry, security has always held a prominent role. However, the onset of 5G – which introduces new network architectures, services and devices …
Featured news
Resources
Don't miss
- macOS vulnerability allowed Keychain and iOS app decryption without a password
- Sitecore zero-day vulnerability exploited by attackers (CVE-2025-53690)
- Cutting through CVE noise with real-world threat signals
- Attackers are turning Salesforce trust into their biggest weapon
- Cloudflare confirms data breach linked to Salesloft Drift supply chain compromise