Internet of Things

Internet of Things | News, how-tos, features, reviews, and videos

digital transformation world map outsourcing iot edge computing
Cybersecurity lock with the abstract circuitry of a security fabric.

tech spotlight iot intro by  go unlee gettyimages 1174958392 thinkstock 178457492 3x2 2400x1600

The Internet of Things in 2020: More vital than ever

Just when we needed it most, the internet of things is delivering gobs of data and remote device control across almost every industry, from healthcare to agriculture.

tech spotlight iot cso thinkstock 510859324 2400x1600

How IoT changes your threat model: 4 key considerations

More IoT devices connected to your network increases your attack surface, lowers visibility to potential threats, and requires greater coordination between IT and OT.

CSO  >  Botnet

New, rapidly evolving IoT botnet Dark Nexus targets wide variety of devices

The sophisticated botnet also has high persistence and is capable of delivering different types of malware in addition to launching DDoS attacks.

5G light trails

4 ways 5G will change your enterprise threat model

The benefits that fifth-generation cellular networks will enable come with security risks that organizations need to pay attention to right now.

youtube thumbnails template 021020
video

Amazon, Microsoft and the JEDI cloud computing contract

The U.S. Department of Defense had two final choices to award its Joint Enterprise Defense Infrastructure (JEDI) cloud computing contract: Microsoft and Amazon. Despite perception of Amazon’s frontrunner status, the D.O.D. awarded the...

DDOS attack

DDoS explained: How distributed denial of service attacks are evolving

A distributed denial of service (DDoS) attack is when attackers attempt to make it impossible for a service to be delivered, typically by drowning a system with requests for data. They have been part of the criminal toolbox for twenty...

youtube thumbnails template
video

Making the move to 5G: What to know, how to plan for it

Is 5G real? When should you upgrade? How will enterprises benefit and what are the costs and ROI? Analyst Jack Gold joins IDG TECH(talk) hosts Juliet Beauchamp and Computerworld's Ken Mingis to answer those questions and more to help...

Internet of Things (IoT) / security alert / wireless network management

Implementation flaws make LoRaWAN networks vulnerable to attack

New report from IOActive details implementation errors that expose LoRaWAN networks to attack and provides a framework for mitigating the risk.

Computerworld - Scary Tech [Slide-05] - Encryption systems with backdoors

Securing the IoT is a nightmare

Currently, we have over 26-billion IoT devices running in our workplaces, offices and homes. If you're looking for an IoT security scorecard, it looks something like this: Security Threats: 26,000,000,000, IoT Secure Devices: 0.

Conceptual illustration of the convergence of disparate technology threads in a digital environment.

Closing the security gap in OT/IT convergence

End-to-end security between converging information technology and operational technology worlds is imperative, but technical and cultural differences separate them. Here’s how to close the gap.

medical network h/ ealthcare IoT / hospital connections and communications

Insecure configurations expose GE Healthcare devices to attacks

The six high-risk vulnerabilities result from hard-coded or no credentials in remote access software and the use of outdated applications.

tt19 063 thumb
video

Top tech stories of 2019

The new Apple Card, the battle for cryptocurrency dominance, cybersecurity skills shortage – just a few of the stories that made headlines in 2019. Watch as IDG TECH(talk) hosts Ken Mingis and Juliet Beauchamp discuss the top tech...

iot security tablet horizontal primary insider pro IDG

IoT security: IT's biggest headache

The internet of things encompasses connected devices on a massive scale, actionable data and innovative business models – and it also brings unprecedented security challenges.

Job Interviewing Skills

Good tech talent is still hard to find (how to bridge the gap)

Companies have big plans for digital transformation, but the lack of skilled IT talent remains an obstacle. Here’s how to cope.

Cybersecurity awareness  >  A weary businessman holds hand to forehead at security training.

IT certifications and training center

Certifications show that you’re committed to your job, have specific skills and are willing to up your game. Check out our online training courses and guides to top certifications -- all part of your Insider Pro subscription.

man typing on laptop search internet web browswer

What is Shodan? The search engine for everything on the internet

Defenders find this simple tool valuable for finding vulnerable devices attached to the web that need to be secured.

csan19 003 botnet attack 2 moment compressed
video

What is a botnet? When IoT devices attack

Most consumers don't consider security when purchasing IoT devices. Yet botnet attacks can be devastating, impacting large portions of the internet. Learn how to prevent botnets in this video.

online certification mortar board graduate student study certificate  by pettycon pixabay and janjf

Earn your IoT security certification

Insider Pro subscribers have free access to an online course that leads to a Certified IoT Security Practitioner (CIoTSP) certification.

Load More
You Might Also Like