Internet of Things

Internet of Things | News, how-tos, features, reviews, and videos

digital twins woman in profile ai mirror duplicate duo pair
healthcare technology / medical data

abstract industrial iot internet of things

Engineering workstation attacks on industrial control systems double: Report

Some of the biggest challenges faced in securing industrial control systems involve integrating legacy and aging operational technology with modern IT systems.

CSO > global security

Security by design vital to protecting IoT, smart cities around the world, says CEO of UK NCSC

UK National Cyber Security Centre’s Lindy Cameron calls for clear, workable international standards to improve the cybersecurity of the internet of things (IoT), connected devices, and smart cities.

IoT security strategy from enterprises using connected devices

IoT devices pose significant threats to enterprises because of lack of visibility into what devices are on enterprise networks and inadequate use of monitoring tools to watch for malicious behaviors.

iot internet of things chains security by mf3d getty

Portnox adds IoT fingerprinting to network access control service

The IoT fingerprinting feature will allow companies to fully identify IoT devices that don't have the storage or processing capabilities to communicate complete identifying information such as model number, or even device type.

Wi-Fi_twilight_blur_800.jpg

Medical device vulnerability could let hackers steal Wi-Fi credentials

Vulnerabilities on battery units for medical infusion pump devices made by Baxter could allow for network access, DoS and man-in-the-middle attacks, highlighting IoT security issues and the need to properly decommission equipment,...

CSO > IoT / Internet of Things, unencrypted/unsecured/vulnerable

Universal database of device vulnerability information launched

DeviceTotal's new repository includes security data for all devices on the market with the aim to better mitigate vulnerabilities.

security system vulnerabilities - a grid of locks with several unlocked

GPS trackers used for vehicle fleet management can be hijacked by hackers

At least one model of GPS tracking devices made by Chinese firm MiCODUS "lacks basic security protections needed to protect users from serious security issues."

Industry 4.0 / Industrial IoT / Smart Factory

Barracuda report: Almost everyone faced an industrial attack in the last year

Major attacks on industrial systems are on the rise, yet security efforts to protect these systems continue to lag behind.

Industry 4.0 / Industrial IoT / Smart Factory / Tablet control of robotics automation.

Dozens of insecure-by-design flaws found in OT products

The OT:ICEFALL report shows that makers of operational technology manufacturers have to improve the security of their devices.

Industry 4.0 / Industrial IoT / Smart Factory

Microsoft includes IoT devices under its Secured-core program

The Edge Secured-core, program is designed to validate IoT devices for specific security hardware technology, and ensure users that they are running an OS with built-in security technology.

Automation/machine learning/artificial intelligence >  mind-gears within circuit-board silhouette

7 machine identity management best practices

Managing machine identities can be just as important as managing human identities, especially in a zero-trust environment.

blockchain in healthcare / doctor accesses one block in a chain of digital medical records

Fragmented tool landscape biggest cybersecurity challenge to medical device makers

Continuous monitoring of security throughout the medical device product lifecycle also poses problems.

Red flag warning button [alert / danger / disaster]

CISA warns of attacks against internet-connected UPS devices

Threat actors have targeted power supplies whose control interfaces are connected to the internet, and CISA says that they should be disconnected immediately.

man typing on laptop search internet web browswer

What is Shodan? The search engine for everything on the internet

Shodan is a search engine for internet-connected devices — from web cams to water treatment facilities, yachts, and medical devices.

man in the middle phone on a string communicaiton

Man-in-the-middle (MitM) attack definition and examples

A man-in-the-middle (MitM) attack is a type of cyberattack in which communications between two parties is intercepted, often to steal login credentials or personal information, spy on victims, sabotage communications, or corrupt data....

cyber technology security protection monitoring concept advanced picture id1276687348

What is NAC and why is it important for network security?

NAC plays a key role in Zero Trust network access (ZTNA), and is a powerful tool for securing IoT devices and protecting mobile and remote workers

medical network h/ ealthcare IoT / hospital connections and communications

Critical flaws in remote management agent impacts thousands of medical devices

The Axeda platform, used by hundreds of IoT devices, has seven vulnerabilities, three of which allow for remote code execution.

Security administration  >  A shield protects a network of users and systems.

NIST releases software, IoT, and consumer cybersecurity labeling guidance

The new guidance aims to tighten security requirements for federally purchased software and give consumers better insight into the security of software and devices they buy.

Load More
You Might Also Like