Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Malicious actors have been exploiting vulnerabilities in some DrayTek enterprise routers in attacks that started before patches were released. [Read More]
U.S. Sen. Mark Warner has sent letters to six Internet networking device vendors urging them to ensure that their products remain secure during the COVID-19 social distancing efforts. [Read More]
A vulnerability that OpenWrt addressed in its opkg fork could have been exploited for the remote execution of arbitrary code. [Read More]
Rockville, Maryland-based startup Sepio Systems, a rogue device mitigation firm, has raised a further $4 million that supplements the Series A round of $6.5 million announced in November 2019. [Read More]
Hackers could have caused the central touchscreen on the Tesla Model 3 to crash by getting the targeted user to visit a malicious website. [Read More]
A new Mirai variant named Mukashi has been delivered to Zyxel NAS devices via exploitation of a recently patched vulnerability tracked as CVE-2020-9054. [Read More]
Thales, Telstra, Microsoft, and Arduino this week announced a partnership aimed at enabling the secure connection of IoT devices to the cloud. [Read More]
Santa Clara, Calif-based IoT security firm Ordr has raised additional funding to bring the total amount raised by the company to roughly $50 million. [Read More]
Cisco says it will release updates for wireless devices affected by the recently disclosed Kr00k vulnerability, including routers, firewalls, access points and phones. [Read More]
A new vulnerability dubbed Kr00k, which may have affected over 1 billion Wi-Fi capable devices before patches were released, could have allowed hackers to obtain sensitive data from wireless communications. [Read More]

FEATURES, INSIGHTS // IoT Security

rss icon

Laurence Pitt's picture
Speech recognition systems make mistakes that could give cybercriminals access to a user’s home network. By activating a squatted skill, an unexpecting user could allow a malicious actor to extract information about their account, home network and even passwords before running the requested command.
Marc Solomon's picture
The ability to aggregate, score and prioritize data and alerts within the context of your environment can allow you to take the right actions faster to mitigate IoT risk.
Dean Weber's picture
IoT security is a tough challenge — involving everything from hard to implement standards; hard to reach industrial components; and choices on how to integrate security around both older “brownfield” and newer IoT systems and equipment.
Laurence Pitt's picture
Organizations are now running IoT application workloads in diverse locations that create complex ecosystems for IT and security personnel to oversee.
John Maddison's picture
Organizations can no longer afford to treat IoT devices as an isolated or independent component of their business, and must implement an effective IoT security strategy.
Laurence Pitt's picture
Advanced smart infrastructure, cloud networks and the Internet of Things (IoT) add more points of entry and ultimately more risk for both network operators and end users.
John Maddison's picture
Since access control technologies are usually the first network element that a new device touches, they need to be able to automatically recognize IoT devices.
Ashley Arbuckle's picture
Whether you work with in-house security resources or outside consultants, security experts are essential to help uncover vulnerabilities and offer recommendations to prioritize and mitigate risks.
Laurence Pitt's picture
Safeguarding emerging IoT ecosystems involves embedding visibility and protection into the fabric of the IoT network.
Torsten George's picture
Unfortunately, the Cyber Shield Act as it stands falls short, since it is a voluntary program that does not incentivize vendors to implement the NIST security standards.