Internet of Things

Research shows that devices banned by US government lack basic security practices
As the August 13 deadline looms for the US ban on Chinese surveillance cameras, the news cycle is re-engaged with the issue. The panic about banned cameras still being in …

Many companies don’t know the depth of their IoT-related risk exposure
In the digital age, cyber is everywhere. Cyber risk now permeates nearly every aspect of how we live and work. Organizations should better understand how to manage the risks …

50% of organizations believe attackers can infiltrate their networks each time they try
As organizations increase investments in automation and agility, a general lack of awareness about the existence of privileged credentials – across DevOps, robotic process …

Healthcare’s blind spot: Unmanaged IoT and medical devices
From imaging to monitoring systems, infusion pumps to therapeutic lasers and life support machines, medical devices are used to improve and streamline patient care. Many of …

New satellite constellations aim to improve IoT connectivity options
By 2024, there will be 24 million IoT connections made via satellite, ABI Research reveals. A new report unveils the long-term opportunity within the satellite space for the …

IIoT risks of relying heavily on edge computing
The sheer volume of data created by the Internet of Things (IoT) is increasing dramatically as the world is becoming progressively more connected. There is projected to be a …

Global IoT market projected to reach $1111.3 billion by 2026
Organizations around the world are increasingly adopting advanced technologies, which is driving the global Internet of Things (IoT) market. Fortune Business Insights in a …

Do cloud apps make you a target for cyber attacks?
Almost half (49%) of businesses believe cloud apps make them a target for cyber attacks, a Thales research reveals. Surveying 1,050 IT decision makers globally, Thales’ 2019 …

Scientists developing self-organizing migration of services with sovereignty over proprietary data
Developing a self-organizing migration of services is the core idea of the team headed by Magdeburg project leader, Professor Dr. Mesut Güne. This means that the services …

Cybersecurity should not be an afterthought within industrial environments
The basics of cyber security are still not being practized regularly and new cyber security risks are emerging as more and more untested technologies are integrated within the …

Experts weigh in on salient issues around emerging threats and security tech
RSA Conference unveiled expert insights into salient issues around emerging threats and security technologies. Based on industry observations and interactions with partners …

Annual spend on Mobile Edge Computing will reach $11.2 billion by 2024
Total annual spend on Mobile Edge Computing (the collection and analysis of data at the source of generation, at the Edge of the network, instead of a centralised location …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)