Internet of Things

code programming software bugs cybersecurity
anthony grieco

internet of things data

How 'smart cities' push IoT cybersecurity for state and local IT

The internet of things is at a much more mature place at the state and local level than it is in the federal government or even private industry. It’s a balancing act, clearly, between government leaders working to implement IoT...

iot security ts

The CSO IoT security basics survival guide

The Internet of Things presents significant security challenges to businesses of all types. Here’s what everyone needs to understand about IoT and its risks.

chair spotlight

How CISOs can answer difficult questions from CEOs

A hypothetical conversation can become all too real, and hopefully you are prepared with the answers. Here is a script to help get you started.

industrial refinery energy plant oil gas

Researchers and defenders needed in IIoT

Strategies to overcome the complexity of patching vulnerabilities in critical infrastructure

vnt 034 citrix 1.00 00 44 16.still005
video

Interview: Tim Minahan SVP & CMO, Citrix

Tim Minahan, Chief Marketing Officer and SVP of Citrix, discusses how Citrix is blending the art and science of marketing, his experience with moving to the cloud and the evolving role of the CMO.

iot data smartcity

Another IoT botnet with pieces of Mirai embedded can do DDoS from 100k devices

Bot-herding software called Persirai, which incorporates pieces of the Mirai botnet code, can commandeer significant chunks of a known 150,000 IP cameras that are vulnerable to Mirai and use them to fire off distributed...

0 attack

How to counteract another ‘Dyn-like’ attack

Jim Hurley, a Distinguished Analyst at technology research and advisory firm ISG, shares his insights on what enterprises using cloud-based as-a-services can do to work with their providers and reduce risks to their business from...

v1.00 01 30 18.still001
video

ShapeScale 3D body scanner hands-on

ShapeScale can measure your body parts within a millimeter of accuracy, showing exactly how your body responds to workouts over time.

02 iot

New IoT malware targets 100,000 IP cameras via known flaw

Over 100,000 internet-connected cameras may be falling prey to a new IoT malware that’s spreading through recently disclosed vulnerabilities in the products.

staples storefront

Staples hires its very first CISO

Staples has hired its first chief information security officer (CISO), a key new member of the office supply giant's team that combines traditional IT and digital transformation.

0 iot intro smart appliances

Six things you need to know about IoT security

It’s in every company’s best interest to “do” IoT correctly, which will mean ratcheting up security measures to capture and ensure a good customer experience. Jack Nichols, director of product management at Genesys, proivdes six ways...

future jobs 1

Security among the hot jobs of the future

It is clear that new technologies like robotics, self-driving cars, 3D printing, drones, artificial intelligence and virtual reality will create major upheavals in all sorts of labor markets, not just technology. (Think self-driving...

black man phone cafe upset

Users have little confidence their company can protect their mobile device

A survey sponsored by Check Point found that 64 percent of respondents are doubtful that their organization can prevent a mobile cyberattack. What can be done to combat that?

internet of things

Cloudflare wants to secure IoT connections to the internet

Web optimization and security firm Cloudflare launched a service that could allow IoT manufacturers to protect devices from attacks and deploy patches much quicker.

robots

Next-gen IoT botnet Hajime nearly 300K strong

The Hajime botnet is nearly 300,000 strong, making it a latent threat nearly as powerful as the notorious Mirai botnet that devastated some high-profile websites last fall, leading some to think the internet had been broken.

mri scanner

Medical devices that could put you at security risk

You remember the talk about former Vice President Dick Cheney's pace maker being susceptible to hackers, but here is a list of some lesser known medical devices that can scare the life out of you.

6 updating security software

Report: Top 25 IT security products

Download this exclusive report highlighting 25 top security products – as rated by actual enterprise users of the products – in categories such as cloud security, firewalls, SIEM, application security and IoT security.

iot attack

A vigilante hacker may have built a computer worm to protect the IoT

Is a vigilante hacker trying to secure your IoT device from malware? The mysterious developer behind a growing computer worm wants people to think so.

Load More