Please turn on your JavaScript for this page to function normally.
IoT
IoT and the resurgence of PKIs

With the digital revolution in full swing, security methods and models need to be re-evaluated to better address both the changing nature of enterprise architectures and …

tech
Adoption of advanced technology continues quickly despite security gaps

93% will use sensitive data in an advanced technology (defined as cloud, SaaS, big data, IoT and container) environments this year. 63% of those also believe their …

truck
Will the IoT force truck stops?

“Not with a bang, but with a whimper,” that was how T.S. Eliot described how the world would end, in his 1925 poem “The Hollow Men.” Things don’t always end in …

industry
Most security pros expect increasing attacks on Industrial Internet of Things

A new Dimensional Research survey looked at the rise of Industrial Internet of Things (IIoT) deployment in organizations, and to what extent it is expected to cause security …

camera
185,000+ vulnerable Wi-Fi cameras just waiting to be hijacked

A generic wireless camera manufactured by a Chinese company and sold around the world under different names and brands can be easily hijacked and/or roped into a botnet. The …

connected house
Connected home solutions adoption remains limited

Adoption of newer connected home solutions is still at the early adopter phase, according to Gartner. The survey, of nearly 10,000 online respondents in the U.S., the U.K. and …

IoT world
IoT goods, software and digital services to be evaluated for privacy and security

Consumer Reports, a US non-profit group whose extensive reviews of consumer goods have helped the public make informed and better choices for many decades, has announced that …

lock
Automating PKI for the IoT platform

In this podcast recorded at RSA Conference 2017, Jeremy Rowley, Executive VP of Emerging Markets at DigiCert, talks about automating PKI for IoT platform and building scalable …

robot
Multiple security flaws found in mainstream robotic technologies

IOActive exposed numerous vulnerabilities found in multiple home, business, and industrial robots available on the market today. The array of vulnerabilities identified in the …

email
Email and IoT security issues persist

New AT&T research shows many businesses are not effectively protecting their data. As more organizations adopt cloud architectures, traditional security protections …

IoT
How can we build a secure IoT world?

We have almost daily proof that the Internet of Things, as it is now, is a minefield of security issues that are just waiting to be exploited. The unfortunate reality is that …

brain
CloudPets connected toys can be turned into remote surveillance devices

The CloudPets data breach saga continues, as Spiral Toys finally reported the breach to the California Attorney General’s Office. As a reminder: Leaked data provided to …

Don't miss

Cybersecurity news