The state of IoT security: OWASP Top Ten highlights challenges

TechBeacon

How has the security of the Internet of Things evolved in recent years? Now, for the first time since 2014, OWASP has updated its own Top Ten list of IoT Vulnerabilities. Security, Information Security, Internet of Things (IoT), Information Security (Info Sec TechBeacon last visited the topic in 2017 and found the picture to be troubling at best.

IoT 73

IoT, Not People, Now the Weakest Link in Security

DevOps.com

Do a quick search on “people weakest link” and you’ll see a raft of articles in which cybersecurity experts and computer scientists point to employees or end users as the biggest vulnerability. The post IoT, Not People, Now the Weakest Link in Security appeared first on DevOps.com.

IoT 94

Why health care cybersecurity is in ‘critical condition’

The Parallax

government-sponsored Health Care Industry Cybersecurity Task Force delivered more than 100 recommendations to the Department of Homeland Security to make medical technology more resistant to hackers. READ MORE FROM ‘NO PANACEA FOR MEDICAL CYBERSECURITY’.

Triaging modern medicine’s cybersecurity issues

The Parallax

Hackers often talk about practicing good “cybersecurity hygiene” : making sure that basic standards, such as using unique passwords for each log-in, are met. ”—Jacki Monson, chief privacy and information security officer, Sutter Health. READ MORE ON MEDICAL SECURITY.

How hackers are approaching medical cybersecurity

The Parallax

READ MORE ON MEDICAL CYBERSECURITY. Dr. Paul Pugsley’s medical cybersecurity crisis in the Emergency Room was part of a simulation at the CyberMed Summit 2018 to teach doctors about complications that can arise from cyberattacks against medical devices and hospitals.

Primer: What DDoS attacks could mean for IoT

The Parallax

More than 40,000 computer servers are at risk of becoming conscripts in the next major DDoS assault because they haven’t been patched and updated , according to a study published last week by cybersecurity company Rapid7.

IoT 171

Next up on hackers’ IoT target list: Gas stations

The Parallax

Two security researchers in Israel have new evidence that gas station systems, from cash registers to fuel pumps, are connected to the Internet and exposed to malicious hackers. Hackers call for federal funding, regulation of software security.

IoT 141

New botnet Torii showcases next stage of IoT abuse, researchers say

The Parallax

Security researchers have caught hackers lashing together Internet-connected devices in a botnet they’re calling Torii, which uses techniques not seen in an IoT botnet before—including intercepting and stealing data, and using the Tor Project network to hide its network traffic.

IoT 147

Reasons to hire IoT developer to transform the industrial sphere

Xicom

An IoT development company is much in demand these days because Internet of Things (IoT) is slowly sprawling into the industrial sphere with each passing day. Any IoT developer that is able to create IoT apps for industries and large-scale businesses will be in much demand and will have the chance to become popular in the IT industry. It is utmost important to be very much updated about the latest trends that are ruling the IoT industry to be a developer.

IoT 40

How IOT may impact your Mobile App Development

AGILE-CODE.COM

IoT states to a system of articles or gadgets that involve established innovation, which empowers them to convey and cooperate with one another. IoT is ending up logically mainstream on account of its ease of utilization and the comfort it brings to the table.

IoT 60

Blockchain Technology can be Critical to IoT Infrastructure Security

CTOvision

Read why Floyd DCosta says that blockchain technology could be a crucial cog in the Internet of Things infrastructure on Entrepreneur : The era of the Internet of things (IoT) is upon us and it is impacting our lives. Today, technology has pervaded into nearly all walks of life, and constant innovation has made it […]. Blockchain and Cryptocurrency CTO News

Mueller’s indictment of election hackers a cybersecurity ‘wake-up call’

The Parallax

As Dave Aitel, former NSA cybersecurity analyst and the current chief security technical officer of cybersecurity company Cyxtera tells The Parallax, the details of the indictment indicate the high level of confidence the Justice Department has in its charges. Regardless of U.S.

The Internet of (Secure) Things – Embedding Security in the IoT

CTOvision

We’re seeing a glimmer of the future – the Internet of Things (IoT) – where anything and everything is or contains a sensor that can communicate over the network/Internet. The underlying technology enabling IoT is Machine-to-Machine (M2M) communications. By George Romas.

The best mobile and IoT conferences of 2019

TechBeacon

The most life-changing products to come out over the next few years will almost certainly center on mobile, the Internet of Things (IoT), and voice-control technology. App Dev & Testing, App Dev, Mobile, Industrial Internet of Things (IIoT), Enterprise Mobile Applications, Mobile Testing, Hybrid Mobile Apps, Mobile Application Security Testing (MAST

A critical look at Gartner’s top 10 IoT trends

CTOvision

Read Fredric Paul analyze Gartner’s predictions for the Internet of Things connected devices on Network World : At Gartner’s Symposium/ITExpo in Barcelona, Spain, earlier this month, the research firm shared a report on 10 strategic trends affecting the Internet of Things (IoT) from 2019 to 2023. In the report, titled Top Strategic IoT Trends and Technologies Through […]. Artificial Intelligence CTO Cyber Security Internet of Things News

Bayshore Networks: Cloud- and on-premises-based IoT cybersecurity technology for industrial enterprises

CTOvision

With this post we are initiating coverage of Bayshore Networks in our IoT Companies category. For a brief introduction see the video at this link and embedded below: The Industrial IoT refers to connected machines — specifically, industrial machines that are now connected to the Internet.

IoT 64

Smart Cities Cybersecurity Challenge

CTOvision

Smart Cities will become a full-scale cyber war battleground unless Congress mandates cybersecurity. The biggest danger in Smart Cities is the assumption that IoT sensors communicating over a 5G fabric to Machine Learning and Blockchain systems will be safe from cyberattacks. Big Data and Analytics Cloud Computing CTO Cyber Security Cyber War Government Cyberwar smart city

IoT, AI, Blockchain: what does the future hold for mobile Healthcare

Apiumhub

As technological advancements continue to impact every sector of life, new tech advancements such as IoT , AI , and Blockchain have become a significant part of mobile healthcare too. These numbers prove the fact that the digital trends such as IOT, AI, and Blockchain are here to stay. While no technology can replace doctors completely, a computerized system provides a secure platform for those who live in remote areas and are not able to access healthcare facilities readily.

IoT 55

PFP Cybersecurity: Providing iron-clad identity for any device and detecting any anomalous behavior

CTOvision

The closest category of security solutions might be those of identity management, authentication and authorization but they are doing these things for hardware, not people. IAM IoT Companies Security Scanning And Testing PFP Cybersecurity

Ransomware Exponentially Increasing as IoT Provides Physical Targeting Opportunities

CTOvision

Ransomware is increasingly targeting multiple industries with downtime and lost productivity as its attack surface expands beyond the virtual realm to the physical via the Internet of Things (IoT), however, organizations can posture against this threat with a comprehensive approach to risk management. CTO Cyber Security News Attack surface Internet of Things IoT ransomwareCrystal Lister.

IoT 64

2017 in cybersecurity and privacy news

The Parallax

From rampant ransomware to the Equifax breach to geopolitical machinations, it’s hard not to be a cynic about the past 12 months of security and privacy news. And not all federal cybersecurity decisions this year were necessarily harmful to consumers.

What network pros need to know about IoT

CTOvision

Read why Dan Tynan says that network professionals should be prepared for prepared for management complexity, immature standards, IoT security challenges on Network World : Architecting for the Internet of Things creates a whole new ballgame for network pros. Gartner predicts there will be more than 20 billion IoT devices in the world by 2020.

IoT 47

2016 Internet of Things (IoT) Predictions

CTOvision

Gartner predicts that number of IoT devices in use worldwide will grow from an estimated 5 billion in 2015 to some 25 billion connected devices by 2020. The best business strategies will perfectly balance the ever-growing IoT market opportunities versus a rapidly evolving threat environment. To help IoT solution providers define their 2016 product roadmap, here are some of INSIDE Secure’s top IoT predictions for the year: IoT hype will become reality.

IoT 57

Pushing Computers to the Edge: Next Generation Security and Privacy Controls for Systems and IoT Devices

CTOvision

The title of his talk is "Pushing Computers to the Edge: Next Generation Security and Privacy Controls for Systems and IoT Devices.". The full presentation is at this link and embedded below: CTO Cyber Security NewsBob Gourley.

IoT 83

Karamba’s bold quest to secure connected cars

The Parallax

That’s the scenario Karamba Security is trying to prevent. Hackable software in the driver’s seat: The current state of connected car security. How Uber drives a fine line on security and privacy. ”—Tim Brom, senior security researcher, Grimm. “If

3 tips to secure your connected home

The Parallax

5 questions to ask before buying an IOT device. How to secure your home Wi-Fi. New ‘secure’ devices aren’t cheap. First, Michaud says, use a separate email account for your finance and banking services from the email account you use to manage your IoT devices.

Your “intelligent” office building is one giant, vulnerable IoT device

CTOvision

We have previously provided context on how the rise of smart cities is creating battlegrounds of the future (see: Smart Cities Cybersecurity Challenge and Getting Real About Smart Cities and Open Data and Modern Battle of Manassas). CTO Cyber Security Cyber War Internet of Things News

IoT 63

Call for Papers: The Intelligent Edge of IoT

Cutter Consortium

IoT, 5G and AI are driving convergence of traditional computing models that deliver value to organizations. The location of analytics, machine learning, and cognitive services is driven by scenarios that require such capabilities at the edge for quick response and cloud for training and long-term management of information. Business Technology Trends Call for Papers Internet of Things analytics Cloud data analytics edge computing fog computing IoT machine learning

IoT 48

Dell Technologies Delivers Proven Wins with IoT Connected Bundles

Armughan Ahmad - Dell EMC

The Dell Technologies team predicts the Internet of Things (IoT) will follow the same adoption curve. However, we understand the risks associated with IoT are significant.

IoT 72

The best mobile and IoT conferences of 2019

TechBeacon

The most life-changing products to come out over the next few years will almost certainly center on mobile, the Internet of Things (IoT), and voice-control technology. App Dev & Testing, App Dev, Mobile, Industrial Internet of Things (IIoT), Enterprise Mobile Applications, Mobile Testing, Hybrid Mobile Apps, Mobile Application Security Testing (MAST

Tips for Mitigating IoT Device and Insider Risk

CTOvision

Organizations today are increasingly adopting Internet of Things (IoT) devices lacking sufficient security protocols which creates unique insider risks that IT teams must address. Cognitio has helped clients across multiple sectors of the economy mitigate risk in the age of IoT.

IoT 59

Pushing Computers to the Edge: Next Generation Security and Privacy Controls for Systems and IoT Devices

CTOvision

The title of his talk is "Pushing Computers to the Edge: Next Generation Security and Privacy Controls for Systems and IoT Devices.". The full presentation is at this link and embedded below: Big Data CTO Cyber Security NewsBob Gourley.

IoT 55

Meet Us at SHARE St Louis And Learn About Hitachi Vantara Solutions for Mainframes In the IoT Age.

Hu's Place - HitachiVantara

The mainframe market is alive and well and may be on the verge of a renaissance in the coming IoT age. That many new devices connected to the internet also opens up many more security exposures. These same capabilities will be required by the backend systems that support IoT.

IoT 59

DHS opens new cybersecurity center to protect infrastructure, Amazon works issues of Rekognition, self-assessment to help against data breaches, Samsung’s IoT hub open to attacks

CTOvision

The following are some of the cybersecurity topics we are tracking: At DHS Announcement, Pence Blames Russia for 2016 Election Interference, Vows to Tighten Cybersecurity The United States government is preparing a major cybersecurity rehaul to protect key public infrastructure. US Department of Homeland Security announced on Tuesday the creation of a new center aimed [.]. CTO Cyber Security Cyber War News

Xage to use blockchain for IoT security, innovation can compromise cybersecurity, Qualcomm announces breakthrough in 5G chips, Google’s Blockchain push, and critical look at US efforts to regulate Internet of Things

CTOvision

The following are some of the enterprise tech topics we are tracking: Xage secures $12 million Series A for IoT security solution on blockchain Blockchain and Internet of Things are both pretty hot topics right now. Palo Alto-based Xage is combining both blockchain and Internet of Things to provide hack-proof security for connected devices.

Bryson Bort of Scythe Discusses IoT Vulnerabilities and Threat Trends To Date

CTOvision

CTO Cyber Security NewsBryson Bort’s presentation at Defcon 2018 is now available and is presented below: Bryson has a unique set of skills.

Your old router could be a hacking group’s APT pawn

The Parallax

Inception Framework’s attack methodology has evolved since it was first detected in 2014 in part by Waylon Grange, senior threat researcher at computer security company Symantec. How to secure your home Wi-Fi. Secret to safer IoT is smarter Wi-Fi, hacker Caezar says (Q&A).

Groups 210

How the Internet of Things is Influencing a New Cybersecurity Era

CTOvision

Cybersecurity is the new chief concern for every organization. Most companies have thus resulted in the internet of things, and it's cybersecurity features to help keep their digital assets safe. But does IoT offer […]. Artificial Intelligence Cyber Security NewsRecent global attacks like Wannacry and NotPetya have proved that hackers aren’t sparing any institution in their latest show of might.

IoT 87

Hackable software in the driver’s seat

The Parallax

Part of the problem, says Deirdre Mulligan , co-director of the University of California at Berkeley Center for Law and Technology and professor at UC Berkeley School of Information, is that the software running in cars—especially self-driving vehicles—is easy to manipulate.

Reading data securely from Apache Kafka to Apache Spark

Cloudera Engineering

With an ever-increasing number of IoT use cases on the CDH platform, security for such workloads is of paramount importance. This blog post describes how one can consume data from Kafka in Spark, two critical components for IoT use cases, in a secure manner. Introduction.

IoT 76