Internet of Things

ipad at the beach
big data risks

wifi iot

IoT messaging protocol is big security risk

MQTT, a popular IoT messaging protocol and Oasis standard, is often left wide open to attacks. Organizations like hospitals, prisons, and critical infrastructure are often vulnerable to IoT device compromise.

The Internet of Identities (IoI)

IoT, mobility, cloud and pressing security needs mean that every node must have a trustworthy identity and a secure path to network services.

ermergency reponse siren

Smart home device calls cops during domestic dispute

A smart device is being credited for potentially saving a life when it misheard what was said, took it as a command and called the cops.

computer programmer or hacker

Closing the CVE gap: Is MITRE up to it?

Critics say the The Common Vulnerabilities and Exposures (CVE) program, managed by MITRE, is falling far behind in its mission to catalog and identify all known vulnerabilities. Its defenders say a new model is closing that gap.

woman shouting into bullhorn

Who cares about smart city security?

There is a fierce debate raging over smart city security, with one side fueling the hype while the other conjures nightmare scenarios. The trouble is that the debate is silent, siloed and unproductive.


What's next in IoT innovations?

Tom Soderstrom talks about the cutting-edge work happening at Jet Propulsion Lab in the evolving field of internet of things.


Mingis on Tech: The lowdown on Cisco Live

Network World's Brandon Butler checks in from Las Vegas, where this week's Cisco Live is under way. The big story: Cisco's efforts to move from hardware to software, security and "intent-based networking."

smart cities iot

Getting smarter about making cities smart

Many cities claim to be ahead of smart curve, but find themselves handcuffed by custom systems

07 vote

Hackers attacked 4 Florida school districts, allegedly hoped to hack voting systems

Hackers who targeted four Florida school districts also allegedly wanted to hack state voting systems.

8 encryption

Who's Down with MPC? (Yeah, You Know Me!)

MultiParty Computation improves data security by calculating encrypted information - what is not revealed cannot be leaked.

Healthcare: Are you prepared to trade privacy for treatment?

The U.S. HHS Health Care Industry Cybersecurity Task Force and the U.K.'s ICO in separate reports highlight the need to better protect patients' information.


Big data and relinquishing your right to privacy

Now more than ever, it’s time for us speak up about our right to privacy.

0630 satellite atm indonesia

Red Bull’s Eye in the (Cyberspace) Sky

AT&T recently announced they will provide full time Internet-of-Things (IoT) monitoring of up to one million Red Bull coolers in retail locations worldwide.  If successful, this will be a powerful example of what Big Data can...

Semi truck montage

Is Waymo's IP in Uber's hands? They may both be victims

Who stole Waymo's intellectual property? Was it an Uber plot to acquire the IP for $680 million of Otto, which was founded by Anthony Levandowski?

jd still 02

Internet of tractors: how sensors and software improve farming accuracy

Internet of tractors: how sensors and software improve farming accuracy

6 reasons chip hacks will become more popular

Code embedded in hardware has vulnerabilities and it's harder to patch. That will make it a target for hackers.

code programming software bugs cybersecurity

Patch the Samba bug before a network worm exploits it

It isn’t at WannaCry-crisis levels yet, but the fact that Samba is so widely used means a network worm can really have a field day exploiting this vulnerability.

anthony grieco

Cisco security exec: ‘Connected devices are creating 277 times more data than people are’

CSO Managing Editor Ryan Francis recently spoke with Anthony Grieco, senior director and trust strategy officer at Cisco’s Security and Trust Organization, about how organizations can securely incorporate new technologies as they...

Load More