Human factor: The Blindspot in Cybersecurity

As a major international centre for trade, finance and logistics, a cyberattack on Singapore’s network could potentially impact the wider regional and global economy. Despite the rapidly changing face of cyberattacks in this digital age, many logistics companies continue to rely heavily on traditional programmes and tools to tighten their security infrastructures.  Read the full […]

IoT Is Another Insider Cyber Security Threat To Consider

IoT devices are increasingly being considered, or adopted, by organizations which were already facing enduring risks from malicious and non-malicious insiders. This expands and further complicates the attack surface that IT teams must defend. Read more on this technical insider risk from Dave Palmer, the director of technology and co-founder of Darktrace, in his interview with […]

IoT Requires Changes From Identity and Access Management Space: Gartner

The identity and access management (IAM) space will need to evolve to meet the needs of the Internet of Things (IoT), according to analyst firm Gartner. In November, Gartner predicted 4.9 billion devices would be Internet-connected in 2015. Securing those devices however remains a challenge that consumers, IT departments and vendors will have to face. […]

Internet of Things: a Security Timebomb?

Read Bob Waugh’s views on why he thinks that Internet of Things is a security timebomb on We Live Security : Hailed as a panacea by those for whom the world cannot move quickly enough, the Internet of Things has been a long time coming. But is Internet of Things security up to scratch? Several […]

Sony, the Internet of Things, and the Evolving Cyber-Threat

Do recent cyber-attacks – including North Korea’s against Sony and a Stuxnet-style attack against a German steel works – suggest that the nature of the cyber-threat is escalating? Chris Bronk thinks so. That’s because advances in computing and the revenue-driven culture of corporate hierarchies are undermining the implementation of much-needed security measures. Read what Chris […]

Fighting the Frankenbeast: How to stop security fears slowing the Internet of Things

The IT industry is getting increasingly excited about the potential of the Internet of Things (IoT) but behind that excitement hidden dangers lurk, according to a new report from HP. HP isn’t the only one to voice concerns: in the US the FTC is taking a closer look at the IoT and in the UK Ofcom […]

Senators to push privacy, security legislation for IoT

Some Democratic senators want new laws that mandate security and privacy measures on the Internet of Things, as concern grows over personal data collected by connected devices. Several democratic members of the Senate Commerce, Science and Transportation Committee said Wednesday they are exploring legislation that would enforce privacy and security standards for connected devices. Read […]

The Internet of Things: What All Companies Need To Know About the FTC Report

The FTC released its Report on the Internet of Things (“IoT”) on January 27, 2015 (“Report”). While the Report is specific to IoT, including devices such as wearable fitness trackers and internet connected cameras and televisions, there are key takeaways for all companies operating online[1]. The FTC defines IoT as “’things’ such as devices or […]

How can proper BYOD and IoT device onboarding improve security?

With a number of never-before-seen BYOD/IoT devices entering enterprise networks, how should security programs deal with onboarding those devices? Plainly and simply, if information security professionals are going to do something about the risks that bring your own devices (BYOD) and Internet of Things (IoT) devices introduce, they’re going to have to find out what […]

Guidance to improve risk management and IoT

As connected devices infiltrate the workplace—some with IT’s knowledge and some without—both value and risk can increase significantly. ISACA has released new guidance urging companies to ask nine critical questions as they grapple with the Internet of Things (IoT). Read more about how to improve risk management practices in your business on Help Net Security.