Please turn on your JavaScript for this page to function normally.
Car
Data-driven vehicles: The next security challenge

Companies are increasingly building smart products that are tailored to know the individual user. In the automotive world, the next generation passenger vehicle could behave …

IoT
IoT cybersecurity’s worst kept secret

By improving access to data and taking advantage of them in fundamentally different ways to drive profitability, IT security executives are rapidly changing perceptions of …

bomb
Companies increasingly reporting attacks attributed to foreign governments

More than one in four security managers attribute attacks against their organization to cyberwarfare or nation-state activity, according to Radware. Nation-state intrusions …

2020 forecast: Attackers will target non-traditional systems

While plenty of attacks will continue to hit traditional targets such operating systems and humans, 2020 will see many attackers taking aim at non-traditional systems. …

IoT
California’s IoT cybersecurity bill: What it gets right and wrong

California state lawmakers should be lauded for SB 327, their well-intentioned legislative attempt at tackling one of the most pressing issues in the tech sector: IoT …

city
Smart cities are on the rise, what are the dangers?

A combination of job prospects, local amenities and other attractions is drawing more people to city living than ever before. Indeed, the UN estimates that by 2050 two-thirds …

World
Trends that will shape the 2020 technology market

In 2020, there will be greater adoption of Continuous Intelligence (CI) technologies, which will elevate IoT data analytics way beyond traditional operational levels and have …

building
2020 is prime for a global building cybersecurity standard

Buildings will account for 81% of all connected things in 2020, ushering in a new era of smart office buildings, schools, hospitals and more that will improve efficiencies for …

IoT
Consumers not willing to compromise when it comes to IoT security

Nearly three quarters of consumers expect manufacturers of connected IoT devices to protect their devices from hacks, according to Karamba Security. Consumers take IoT …

KeyWe
Unpatchable KeyWe smart lock can be easily picked

A design flaw in the KeyWe smart lock (GKW-2000D), which is mostly used for remote-controlled entry to private residences, can be exploited by attackers to gain access to the …

cloud
What steps should agencies take to better prepare for a multi-cloud future?

Agencies do not feel prepared to manage current multi-cloud environments. While most Federal IT decision makers say their agency already uses multiple cloud platforms (81 …

5G
5G IoT security: Opportunity comes with risks

Slowly but surely, 5G digital cellular networks are being set up around the world. It will take years for widespread coverage and use to be achieved, so what better time than …

Don't miss

Cybersecurity news