Relying on legacy security technologies leaves you blind to IoT threats

As shadow IoT infiltrate organizations, the variety of risks and threats stemming from these devices put networks and data at risk, according to 802 Secure. IoT and IIoT (Industrial IoT) introduce new IoT networks autonomous from the enterprise network. Organizations are blind to these IoT networks and devices across a plethora of new protocols and frequencies.

“While most organizations prepare for IoT enablement, our threat intelligence shows that most companies are still vulnerable to 10 year old wireless vulnerabilities,” said Mike Raggo, Chief Security and Threat Research Officer at 802 Secure.

Read more about the findings of the 802 Secure research on Help Net Security.





Gain Deeper Insights Into The Threat

Sign up to gain access to our special reports on threat actors and their tactics as well as daily Threat Brief.

Your support will enable us to continue our production of action-oriented content and help us help you stay informed on the latest in adversary activities.

Try our free two week trial.

Sign Up For Free Trial of The Daily Threat Brief