Micro Focus
The gift that keeps giving away your data
If you unwrapped a shiny, new connected device this holiday season, it’s likely that you’re in the honeymoon stage, reaping many benefits from your new device. However, this …
The early IoT gets the worm
Five days after the start of World War I, Sir Edward Grey, British Foreign Secretary, remarked to a close friend, “The lights are going out all over Europe, we shall not see …
Building the IoT monster
When Mary Shelley wrote Frankenstein, she imagined the misguided doctor assembling his creature from dead body parts, who instead of elevating science, created something dark …
Democracy for the Internet of Things
In the past I’ve written a number of times on the way that the IoT potentially changes the relationship between governments and their constituents – and a profound change that …
IoT-based DDoS attacks on the rise
Cybercriminal networks are increasingly taking advantage of lax Internet of Things device security to spread malware and create zombie networks, or botnets, unbeknownst to …
Organizations sacrificing security for the speed of business
Organizations know how to improve security. However, due to pressures caused by the rate of business change, including the adoption of new technologies and applications, …
IoT Village uncovers 47 security vulnerabilities across 23 devices
New dangers in both home security and municipal power facilities were revealed as the results of the 2nd Annual IoT Village, held at DEF CON 24 in Las Vegas. More than 47 new …
Micro Focus merger with HPE’s Software Business Segment worth $8.8 billion
Micro Focus announced today its intent to merge with HPE’s Software Business Segment in a transaction valued at approximately $8.8 billion. The merger is subject to …
The explosive growth of the IoT security market
The IoT security market is estimated to grow from USD 7.90 billion in 2016 to USD 36.95 billion by 2021, at a CAGR of 36.1%, according to MarketsandMarkets. The major forces …
The IoT blame game
The first Friday the thirteenth of any year is officially “Blame Someone Else Day.” What a delightful thought – that all the failures, inconsistencies, and …
IoT and virtual reality: What’s next?
Smart doorbells, clever fridges, talking TVs, intelligent manufacturing, self-driving cars – all pretty cool. The IoT, in fact, is chock full of potentially very cool …
Why outsource risk management to people who don’t care?
The 2015 Cost of Cyber Crime Study by the Ponemon Institute reported that 50% of companies have implemented some sort of access governance technology. It fell 4th on the list …
Featured news
Resources
Don't miss
- Preventing data leakage in low-node/no-code environments
- Strengthening security posture with comprehensive cybersecurity assessments
- Neosync: Open-source data anonymization, synthetic data orchestration
- Update your OpenWrt router! Security issue made supply chain attack possible
- Microsoft: “Hack” this LLM-powered service and get paid