IoT Security

IoT Security | News, how-tos, features, reviews, and videos

digital twins woman in profile ai mirror duplicate duo pair
healthcare technology / medical data

abstract industrial iot internet of things

Engineering workstation attacks on industrial control systems double: Report

Some of the biggest challenges faced in securing industrial control systems involve integrating legacy and aging operational technology with modern IT systems.

iot internet of things chains security by mf3d getty

Portnox adds IoT fingerprinting to network access control service

The IoT fingerprinting feature will allow companies to fully identify IoT devices that don't have the storage or processing capabilities to communicate complete identifying information such as model number, or even device type.

Wi-Fi_twilight_blur_800.jpg

Medical device vulnerability could let hackers steal Wi-Fi credentials

Vulnerabilities on battery units for medical infusion pump devices made by Baxter could allow for network access, DoS and man-in-the-middle attacks, highlighting IoT security issues and the need to properly decommission equipment,...

Industry 4.0 / Industrial IoT / Smart Factory

Barracuda report: Almost everyone faced an industrial attack in the last year

Major attacks on industrial systems are on the rise, yet security efforts to protect these systems continue to lag behind.

Industry 4.0 / Industrial IoT / Smart Factory / Tablet control of robotics automation.

Dozens of insecure-by-design flaws found in OT products

The OT:ICEFALL report shows that makers of operational technology manufacturers have to improve the security of their devices.

Industry 4.0 / Industrial IoT / Smart Factory

Microsoft includes IoT devices under its Secured-core program

The Edge Secured-core, program is designed to validate IoT devices for specific security hardware technology, and ensure users that they are running an OS with built-in security technology.

medical network h/ ealthcare IoT / hospital connections and communications

Outdated IoT healthcare devices pose major security threats

Ransomware has emerged to become the worst nightmare in healthcare and hospital devices running on outdated Windows versions or open-source software like Linux are the easy targets, according to research by Cynerio.

USA / United States of America stars + stripes and binary code superimposed over The White House

NIST gears up for software security and IoT labeling pilot programs

Intended to help consumer make more secure software and IoT device purchases, the labeling guidelines are voluntary and self-policing at this time.

hacker access to IoT / internet of things

Flaws in the Nucleus embedded TCP/IP stack puts critical systems at risk

The NUCLEUS:13 vulnerabilities can allow remote code execution or denial of service attacks. Billions of devices could be affected.

Tech Spotlight   >   Cloud [IFW]   >   Conceptual image of IoT cloud services.

BusyBox flaws highlight need for consistent IoT updates

Some of the 14 vulnerabilities could result in remote code execution or denial of service attacks.

spot edgecomputing cso by 4 pm production shutterstock 2400x1600 primary 3

Securing the edge: 4 trends to watch

The global COVID-19 pandemic exacerbated some of the security risks associated with the move to a more distributed computing model. Here are 4 ways security organizations are responding as edge computing threats evolve.

shutterstock editorial 11745281m blackberry

BlackBerry faces bad PR by failing to go public with BadAlloc vulnerability

Although the company informed its OEM customers of the vulnerability, users of IoT devices running its QNX OS were potentially kept in the dark.

iot internet of things chains security by mf3d getty

IoT devices have serious security deficiencies due to bad random number generation

It's not the IoT vendors' fault. Lack of a cryptographically secure pseudo-random number generator subsystem for the internet of things devices will be vulnerable.

industrial power plant hacked skull and crossbone pixels security breach power plant by jason black

Serious flaws in widespread embedded TCP/IP stack endanger industrial control devices

Critical vulnerabilities potentially affect millions of devices, but finding and patching them will be difficult.

5G mobile wireless network

The race to secure 5G

The arrival of 5G technology introduces a new era of digital transformation. Security can't be an afterthought.

What it takes to become an information assurance analyst

This in-demand role calls for a rare combination of superior communication skills and security chops. Learn how one information assurance analyst landed his current job, the skills and training that helped him get there, and where his...

Fraud prevention: Improving internal controls

Internal fraud controls aren't fire-and-forget. Smart collaboration and ongoing improvement will help keep fraud in check. Here are the basics.

information security 2

How to write an information security policy

Learn the critical first step, why consensus is key, what to cover and how make your information security policy — and program — effective.

Load More
You Might Also Like
BrandPosts
Learn more