Please turn on your JavaScript for this page to function normally.
connected house
Infosec expert viewpoint: IoT security initiatives

IoT went quickly from buzzword to mainstream, and connected devices have become common in households and enterprises around the globe. A worrying lack of regulation has fueled …

gift
This year’s most hackable holiday gifts

McAfee announced its third annual Most Hackable Holiday Gifts list to help consumers identify potential security risks associated with popular gifts this holiday season. In …

healthcare
Connected technologies will accelerate security threats to healthcare industry

Life sciences and healthcare companies will follow the lead of other industries and integrate connected technologies including Internet of Things (IoT) and intelligent …

IoT
IoT anxiety is consuming security professionals

A new survey conducted by Forrester Consulting unveiled that security and LoB leaders are experiencing high levels of anxiety due to IoT/OT security concerns, largely due to …

bulb
What makes an intelligent enterprise?

A new global survey by Zebra Technologies analyzes where companies are on the journey to becoming an intelligent enterprise, how they are connecting the physical and digital …

Amazon Key
Would you let Amazon unlock your door?

Amazon recently announced the launch of the Amazon Key, allowing the Amazon delivery person to open your door in order to place your package inside, where presumably it will …

measure
Most organizations and consumers believe there is a need for IoT security regulation

90% of consumers lack confidence in the security of Internet of Things (IoT) devices. This comes as more than two-thirds of consumers and almost 80% of organizations support …

LG HomeHack
Researchers turn LG’s Hom-Bot vacuum cleaner into a real-time spying device

Check Point researchers have discovered a vulnerability in LG’s smart home infrastructure that could have allowed hackers to take over the legitimate user’s account and, …

open source
Companies turn a blind eye to open source risk

Though open source software (OSS) helps software suppliers be nimble and build products faster, there are hidden software supply chain risks all software suppliers and IoT …

DDoS
DDoS attacks: Brands have plenty to lose, even if attacked only once

DDoS attacks continue to be an effective means to distract and confuse security teams while inflicting serious damage on brands. Neustar discovered that brands experienced a …

energy
Outsmarting grid security threats

Almost two-thirds (63 percent) of utility executives believe their country faces at least a moderate risk of electricity supply interruption from a cyberattack on electric …

keys
PKI changes and uncertainty due to new applications

New research by the Ponemon Institute reveals the Internet of Things (IoT) is playing an increasingly important role in influencing public key infrastructure (PKI) planning …

Don't miss

Cybersecurity news