Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

A new piece of malware is targeting improperly secured Internet of Things (IoT) devices with the purpose of bricking them, Akamai’s security researchers have discovered. [Read More]
Finite State finds many potential backdoors in Huawei equipment, and says the Chinese company’s products are less secure compared to other vendors. [Read More]
A variant of the Mirai Internet of Things (IoT) malware called Echobot uses a total of 26 different exploits for the infection phase, Akamai reports. [Read More]
Two vulnerabilities found in the Alaris Gateway Workstation from medical tech company BD can expose infusion pumps to hacker attacks. [Read More]
A new survey from Irdeto demonstrates that direct cyber-attacks against IIoT have already started, and that industry is not yet well prepared. [Read More]
Certificate Authority (CA) Sectigo, formerly Comodo CA, has acquired Icon Labs, a provider of cross-platform security solutions for embedded OEMs and Internet of Things (IoT) device manufacturers. [Read More]
Samsung unveils Exynos i T100, a new chip designed to enhance the security and reliability of IoT devices that use short-range communication protocols, such as BLE and Zigbee. [Read More]
NIST’s National Cybersecurity Center of Excellence (NCCoE) is working on an industrial IoT (IIoT) security project for the energy sector. [Read More]
The UK government has published a consultation document on the proposed regulation of consumer IoT devices. [Read More]
Researchers at Tenable discover 15 vulnerabilities across 8 wireless presentation systems, including flaws that can be exploited to hijack devices. [Read More]

FEATURES, INSIGHTS // IoT Security

rss icon

Seema Haji's picture
Technologies like artificial intelligence (AI), augmented reality (AR) and machine learning (ML) once seemed stranger than fiction, but are now playing a growing role in industrial environments.
Seema Haji's picture
The risk created by the proliferation of industrial IoT (IIoT) is rising, thanks to the continued mismanagement of third-party involvement in sensitive industrial environments.
Seema Haji's picture
Smart IoT devices in industrial settings, such as energy, oil/gas and manufacturing, have shifted the perspective on OT environments from being reactive to proactive and predict failures.
Seema Haji's picture
New technology like IoMT in any space is always a double-edged sword. But the onus is not on manufacturers alone. It’s up to healthcare organizations to take the initiative to manage and secure their environments.
Seema Haji's picture
With the new year underway, it’s time for CISOs to see their security resolutions through from the factory floor, SOCs and across the entire enterprise.
Laurence Pitt's picture
Speech recognition systems make mistakes that could give cybercriminals access to a user’s home network. By activating a squatted skill, an unexpecting user could allow a malicious actor to extract information about their account, home network and even passwords before running the requested command.
Marc Solomon's picture
The ability to aggregate, score and prioritize data and alerts within the context of your environment can allow you to take the right actions faster to mitigate IoT risk.
Dean Weber's picture
IoT security is a tough challenge — involving everything from hard to implement standards; hard to reach industrial components; and choices on how to integrate security around both older “brownfield” and newer IoT systems and equipment.
Laurence Pitt's picture
Organizations are now running IoT application workloads in diverse locations that create complex ecosystems for IT and security personnel to oversee.
John Maddison's picture
Organizations can no longer afford to treat IoT devices as an isolated or independent component of their business, and must implement an effective IoT security strategy.