YOU ARE AT:TagsSecurity

BROWSING: Security

Meet the Qualcomm Snapdragon 845 mobile platform

Snapdragon 845 brings major advancements in immersive AV, AI, security, connectivity and performance For the past five year, Qualcomm Technologies has spent more than $1 billion per quarter on research and development. Last week, with a bevy of executives, partners, press and analysts on hand...

A review of the latest IIoT security regulations and guidelines

Conformity is everything in the fight against cyber-crime. Traditionally, the way to secure IT systems has been to “bring everything together, and keep everything the same”, remarks Senthil Ramakrishnan, lead member of technical staff at AT&T. But the internet of things (IoT) confounds this...

IIoT security: How to securely connect legacy OT systems

The internet of things (IoT) has turned the industry’s traditional security model of isolationism on its head. Suddenly, devices and systems, until now segregated by physical locks and operational air-gaps, are easily accessible. “In IT, servers are locked away in data centers where only...

Enterprise IoT Editorial Report: Industrial IoT security – the pitfalls and practicalities of securing manufacturing and supply chain IoT systems

The ‘internet of things’ (IoT) will usher in a fourth industrial revolution, and raise a storm. Manufacturing and distribution businesses anchored by old systems and processes will be drowned by the rising tide; those that transform their operations will catch a sail. But it...

Enterprise IoT Editorial Report: Industrial IoT security – the pitfalls and practicalities of securing manufacturing and supply chain IoT systems

The ‘internet of things’ (IoT) will usher in a fourth industrial revolution, and raise a storm. Manufacturing and distribution businesses anchored by old systems and processes will be drowned by the rising tide; those that transform their operations will catch a sail. But it...

Enterprise IoT Webinar: Enterprise IoT Playbook – Effective rollout strategies and security for enterprise

Somebody said it first: everything that can be connected will be connected. In tech, it seems never a truer word was spoken. Analysts reckon there will be 30 billion connected ‘things’ by 2020, and 75 billion by 2025. The ‘internet of things’ (IoT) promises...

Enterprise IoT Editorial Webinar: Enterprise IoT Playbook – Effective rollout strategies and security for enterprise

Somebody said it first: everything that can be connected will be connected. In tech, it seems never a truer word was spoken. Analysts reckon there will be 30 billion connected ‘things’ by 2020, and 75 billion by 2025. The ‘internet of things’ (IoT) promises...

IIoT security: How to establish a supply chain of trust

There are security vulnerabilities throughout the IoT supply chain, stretching right back to sourcing components. Enterprise users, particularly those engaged in industrial operations and critical operations, should review and monitor their IoT suppliers, and work with trusted and reputable partners. “The largest challenge for...

IIoT security: Why devices are the weakest link in the IoT stack

The most significant challenge for the internet of things (IoT) is device security. Without question, devices represent the weakest link in the IoT technology stack, the industry reckons. “This is because devices are constrained in battery and computing power,” notes Carlos Carazo, director of...

Preventing IoT Edge Device Vulnerabilities

  Security issues around IoT edge devices are rarely mentioned in literature, however, the projected billions of IoT edge devices out in the wild makes for a vast attack surface. Should hardware designers be concerned about security for IoT edge devices? And, is it worth...

Preventing IoT Edge Device Vulnerabilities

  Security issues around IoT edge devices are rarely mentioned in literature, however, the projected billions of IoT edge devices out in the wild makes for a vast attack surface. Should hardware designers be concerned about security for IoT edge devices? And, is it worth...

IIoT security: The top 10 security vulnerabilities

And how the industry is failing to learn from its mistakes The technology industry is failing to learn from its mistakes, as familiar security failings from the IT space hobble the nascent internet of things (IoT) market, and threaten its growth. A glance at top...

How to patch security holes

What are security holes? Applying patches to operating systems is pivotal to network security. A software vulnerability is typically a security hole discovered in an operating system or software program, which hackers target with a specific code clothed as malware. In the interest of taking...

Nokia taps automation to help operators fight ransomware

Smartphones are responsible for the majority of mobile network infections, and most infected smartphones are running Android applications, according to Nokia. The company tracks ransomware through its threat intelligence lab and has used the data gathered to develop new software to fight ransomware. Nokia...

Despite ongoing enhancement, cybersecurity risks continue to encroach

  Cybersecurity breaches are a much talked about but little-addressed problem for corporations today, as every hack reveals just how hard it is to stay ahead of a technically savvy, often criminal element. In fact, the problem is so extensive that a recent study by...

Rethinking privacy in the age of Internet intimacy (Reality Check)

  Our desire for privacy is part of what makes us human. None of us likes to have our privacy invaded, whether from someone reading over our shoulder or a data breach. Every day we read stories about foreign government hacks and ads that follow...

IoT security is critical, hard, achievable: 3 best practices for today’s networks (Reader Forum)

The rapid adoption and deployment of IoT devices is a significant contributor to digital transformation. To compete in the new digital marketplace, organizations must monitor and manage critical network and system components in real time, and create algorithms to extract meaningful information from the Big...

Panasonic focuses on cybersecurity for autonomous cars

The Japanese firm said the system detects and prevents cyber attacks in connected and autonomous cars Panasonic Corporation announced the development of an automotive intrusion detection and prevention systems to prevent cyberattacks in autonomous and connected cars. Panasonic said its newly developed system will ensure safe...

Three steps you can take now for more secure mobile IoT (Reader Forum)

The Cisco Visual Networking Index reports that almost half a billion (429 million) mobile devices and connections were added in 2016. Smartphones made up the bulk of this growth, followed by M2M modules. These devices, self-driving cars, mobile-connected tablets and more comprise the mobile internet...

Which companies are most vulnerable to IoT hacks?

Mid-size companies are embracing the internet of things, but are not always implementing security measures to protect their data. One in eight has been the victim of a cyber attack related to the IoT, according to a new study commissioned by Arctic Wolf, a...

HPE software business completes $8.8 billion Micro Focus merger

HPE and Micro Focus merge to create world’s seventh largest software vendor Hewlett Packard Enterprise (HPE) announced it completed a $8.8 billion spin-off and merger with U.K. software businesses Micro Focus Friday, claiming to now be seventh-largest software vendor in the world. The companies will...

Verizon secures its virtual network services with Check Point

Verizon expands its software-defined ecosystem by integrating another security tool Verizon Communications is offering another security component to its virtual network services platform with the addition of Check Point Software Technologies. Verizon has become more and more concerned with securing its virtual service line, and it’s...

Kaspersky Lab launches IoT scanner

The IoT launch occurs while the FBI is reportedly urging U.S. firms to stop using Kapersky Lab’s security solutions Kaspersky Lab has released a beta version of its solution for the smart home and the internet of things (IoT) - Kaspersky IoT Scanner. This free...

Which team member is your company’s biggest mobile security risk? (Reality Check)

The workforce of the future will be more mobile than ever. By 2020, 40% of the global workforce will be mobile. In the U.S. and Europe, that number will soar to 75%. The changing composition of the modern workforce accelerates the need for mobile...