Internet of Things
Data-driven vehicles: The next security challenge
Companies are increasingly building smart products that are tailored to know the individual user. In the automotive world, the next generation passenger vehicle could behave …
IoT cybersecurity’s worst kept secret
By improving access to data and taking advantage of them in fundamentally different ways to drive profitability, IT security executives are rapidly changing perceptions of …
Companies increasingly reporting attacks attributed to foreign governments
More than one in four security managers attribute attacks against their organization to cyberwarfare or nation-state activity, according to Radware. Nation-state intrusions …
2020 forecast: Attackers will target non-traditional systems
While plenty of attacks will continue to hit traditional targets such operating systems and humans, 2020 will see many attackers taking aim at non-traditional systems. …
California’s IoT cybersecurity bill: What it gets right and wrong
California state lawmakers should be lauded for SB 327, their well-intentioned legislative attempt at tackling one of the most pressing issues in the tech sector: IoT …
Smart cities are on the rise, what are the dangers?
A combination of job prospects, local amenities and other attractions is drawing more people to city living than ever before. Indeed, the UN estimates that by 2050 two-thirds …
Trends that will shape the 2020 technology market
In 2020, there will be greater adoption of Continuous Intelligence (CI) technologies, which will elevate IoT data analytics way beyond traditional operational levels and have …
2020 is prime for a global building cybersecurity standard
Buildings will account for 81% of all connected things in 2020, ushering in a new era of smart office buildings, schools, hospitals and more that will improve efficiencies for …
Consumers not willing to compromise when it comes to IoT security
Nearly three quarters of consumers expect manufacturers of connected IoT devices to protect their devices from hacks, according to Karamba Security. Consumers take IoT …
Unpatchable KeyWe smart lock can be easily picked
A design flaw in the KeyWe smart lock (GKW-2000D), which is mostly used for remote-controlled entry to private residences, can be exploited by attackers to gain access to the …
What steps should agencies take to better prepare for a multi-cloud future?
Agencies do not feel prepared to manage current multi-cloud environments. While most Federal IT decision makers say their agency already uses multiple cloud platforms (81 …
5G IoT security: Opportunity comes with risks
Slowly but surely, 5G digital cellular networks are being set up around the world. It will take years for widespread coverage and use to be achieved, so what better time than …
Featured news
Sponsored
Don't miss
- How much does cloud-based identity expand your attack surface?
- Finding software flaws early in the development process provides ROI
- Zero-day exploitation surged in 2023, Google finds
- NHS Scotland confirms ransomware attackers leaked patients’ data
- Patch actively exploited Microsoft SharePoint bug, CISA orders federal agencies (CVE-2023-24955)