Security Experts:

long dotted


Microsoft has shared the results of the Azure Sphere Security Research Challenge and the company said it paid out more than $374,000. [Read More]
A new Mirai-based botnet is targeting zero-day vulnerabilities in Tenda routers, according to researchers at Chinese cybersecurity company Qihoo 360. [Read More]
Cloud-based enterprise device security platform provider Eclypsium on Thursday announced raising $13 million in an oversubscribed funding round. [Read More]
HP has expanded its bug bounty program to office-class ink and toner cartridge vulnerabilities, for which the company is prepared to pay out up to $10,000. [Read More]
Mozi, a relatively new botnet, has fueled a significant increase in Internet of Things (IoT) botnet activity, IBM reported this week. [Read More]
CISA has been named a Top-Level Root CVE Numbering Authority and it will oversee CNAs that issue CVE identifiers for vulnerabilities in industrial and medical products. [Read More]
The U.S. House of Representatives this week passed the IoT Cybersecurity Improvement Act. [Read More]
OT and IoT cybersecurity company Nozomi Networks announced this week that it’s now a CVE Numbering Authority (CNA). [Read More]
Multiple vulnerabilities identified in Philips patient monitoring solutions could provide attackers with unauthorized access to patient data. [Read More]
Researchers have once again showed that many printers can still be hacked remotely; they hijacked 28,000 devices, but believe roughly half a million are vulnerable to attacks. [Read More]


rss icon

Justin Fier's picture
As IoT devices turn homes into ‘smart homes’, they also expose consumers to cyber-attacks in their everyday lives. The industry needs to bring its attention back to these issues and identify potential solutions.
Gunter Ollmann's picture
Securing smart cities offers many opportunities to rethink our assumptions on security and “level up” the discussion to solve problems at the ecosystem level.
Seema Haji's picture
Because blockchain can process millions of transactions accurately and in the right order, it can protect the data exchanges happening between IoT devices.
Gunter Ollmann's picture
In a world of over-hyped bugs, stunt hacking, and branded vulnerability disclosures, my advice to CISOs is to make security lemonade by finding practical next steps to take.
Seema Haji's picture
An insider breach targeting OT and IoT systems has the potential to shut down electrical grids, contaminate water supplies and otherwise destroy a nation’s infrastructure.
Seema Haji's picture
Technologies like artificial intelligence (AI), augmented reality (AR) and machine learning (ML) once seemed stranger than fiction, but are now playing a growing role in industrial environments.
Seema Haji's picture
The risk created by the proliferation of industrial IoT (IIoT) is rising, thanks to the continued mismanagement of third-party involvement in sensitive industrial environments.
Seema Haji's picture
Smart IoT devices in industrial settings, such as energy, oil/gas and manufacturing, have shifted the perspective on OT environments from being reactive to proactive and predict failures.
Seema Haji's picture
New technology like IoMT in any space is always a double-edged sword. But the onus is not on manufacturers alone. It’s up to healthcare organizations to take the initiative to manage and secure their environments.
Seema Haji's picture
With the new year underway, it’s time for CISOs to see their security resolutions through from the factory floor, SOCs and across the entire enterprise.