Remove eBook Remove Infrastructure Remove IoT Remove Technical Review
article thumbnail

Cybersecurity Snapshot: IoT Vendors Fail at Vulnerability Disclosures, While Cyber Threats Again Top Business Risks 

Tenable

Learn all about how most IoT product makers lack vulnerability disclosure policies. Specifically, among 332 IoT product vendors surveyed, only 27% have a vulnerability disclosure policy, even despite an increase in legislation and regulation regarding this issue. Plus, businesses again rank cyber risk as their top concern.

IoT 52
article thumbnail

How to Choose an OT Cybersecurity Solution Vendor

Tenable

As cyberattacks in critical infrastructure, such as those on the Colonial Pipeline, make headlines, cybersecurity experts must address the risk that this esoteric environment poses to their company. Acting like an ostrich and putting your head in the sand will not be sufficient when you’re being questioned about your due diligence.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Internet of Things Strategy: It Will Determine Your Organization’s Future

Dion Hinchcliffe's Web 2.0 Blog

Few technology developments will ultimately have the global cultural, business, and economic impact of the Internet of Things (IoT.) While there will be the requisite debates about whether this is always a good thing, the implacable march of technology development will ensure it’s going to happen anyway.

article thumbnail

Vulnerability and risk management: How to simplify the process

Ivanti

Consider just how many devices, assets and people interact with a company’s IT infrastructure today: Devices (desktops, laptops, mobile and IoT devices – corporate-owned and personal). Its tools and best practices improve IT ability to track, respond to and service technology requests from the end user and any other internal clients.

How To 71
article thumbnail

The 8 Best Practices for Reducing Your Organization’s Attack Surface

Ivanti

Any unused or unnecessary assets, from endpoint devices to network infrastructure, should also be removed from the network and properly discarded. Most commonly, that involves patching exploited vulnerabilities on the infrastructure side and fixing vulnerable code in the application stack. #4:

article thumbnail

MYTH #3: It’s Better To Block Than To Permit Access

Firemon

They have internal and external users, APIs, and IoT devices that all need access to their networks. So access control is not only a technological puzzle. Start by determining an acceptable level of risk and solicit input from both technology and business stakeholders. Automate periodic reviews. Download the ebook now.

article thumbnail

What COVID-19 Response Strategies Tell Us About the Business-Cybersecurity Disconnect

Tenable

The popularity of internet-of-things (IoT) devices makes them potential threat vectors. Our work puts us squarely at the intersection of technology and business. A regular [hospital] room is configured a certain way from a technology perspective. We're trying to reduce [operating expenditures] and get back on budget.