Internet of Things

Detected: A Movie, IoT, Wearable Tech, Breast Cancer, And Cisco?

One might never think that Cisco would be involved with wearable tech, never mind breast cancer – but a movie? The film tells the story of a startup that seeks to bring a medical product to market - a product that is connected to the Internet and driven by big data.

How to Manage Security Risks and Be Happy

With hackers using ransomware and other attack methods to compromise high-value privileged user credentials, organizations need to take a serious look at how they approach their cyber defense. Here’s where to start.

The Metamorphosis of an Open Source Bot - Mirai to Persirai

The Mirai malware has become particularly notorious for recruiting IoT devices to form botnets that have launched some of the largest distributed denial of service (DDoS) attacks ever recorded. This new Experts Corner from Robert Hamilton tracks the evolution of the Mirai botnet.

The Internet of Toys. Is Barbie Spying on You?

I just received a review sample of a toy that is—and this is not a word I use lightly—awesome. It's the Cozmo, a small robot that is just amazing. Isn't that adorable? But, what's the catch?

I Ran The Boston Marathon. Here is What I Learned

Ted Harrington recently ran The Boston Marathon – the oldest, most prestigious, arguably most important marathon in the world. According to Ted, it was by far one of the most fulfilling experiences of his entire life. Throughout the course of preparing for, attempting, and executing this feat, he noticed some striking parallels between running and entrepreneurship. This is his story.

The Building Blocks Of CyberSecurity Are People

There’s an old joke in the community that there is no patch for the user – technology can be fixed, but human mistakes cannot be overcome. In this new An InfoSec Life article, Joseph Pindar shares his beliefs that peoples’ actions aren’t a problem that can be easily dismissed with a joke.

IoT And The Quantum Threat. What To Do?

These days, every report on the Internet of Things (IoT) reminds us that we are continuing to increase our connectivity to the Internet through everyday appliances, sensors, and wearables, despite rampant security risks. In this new Experts Corner, Scott Totzke looks at how already-vulnerable technologies are left wide open.

So, How Does Machine Learning Apply To Cyber Security?

There has been a great deal of attention paid to the advantages of machine learning in security tools lately. And while it shows a great deal of promise, the reality is alone, machine learning is not enough to consistently and accurately detect, prevent or predict threats and is prone to false-positives. When considering how to reduce the overall threat exposure window, organizations need to understand how, only when combined with additional technologies, machine learning can be effective.

IoT Pose A Threat To Anything And Everyone Connected

When it comes to the Internet of Things, it’s easy to identify the breadth and depth of the potential value of these connected things. It’s not so easy identifying the threats, risks, and related management solutions. Expert Chuck Brooks gives us his view into how to get a handle on these challenges.

A Dialogue With Joe Gray, Enterprise Security Consultant

ITSPmagazine recently caught up withJoe Gray, Enterprise Security Consultant at Sword & Shield Enterprise Security. Joe shared his views on personal information sharing, privacy, and the value of community service for information security awareness throughout society.

Quantum Computing Is Creating Driverless - More Hackable - Cars

Of the top disruptive technologies that will benefit from quantum computing, self-driving cars look most imminent as a commercial prospect. But how does this impact the hackability of these vehicles? Scott Totzke explains in his latest ITSPmagazine Experts Corner.

The Side Effects Of A Technology Craving Society - Part 1

We live in a technology-hungry society where consumers are accustomed to the convenience of technology without understanding the risks and vulnerabilities that come with it. In this part 1 of 2 InfoSec Life articles, Phil Agcaoili, CISO, discusses the five core issues of basic cyber hygiene.

What Does the Future Hold for IoT Device Manufacturers?

IoT security is certainly a challenging landscape. It was difficult enough to secure a select few smartphone operating systems like IOS and Android, but IoT is a whole new world with an unlimited number of non-standard device operating systems. Michael Lynch explores this world and the future it holds for the IoT device manufacturers.

Protecting Data on IoT’s Rocky Road

Before rushing headlong into the Internet of Things, it's good to know what happens to the data that all those connected devices collect--and how to protect it.

Companies Are Taking the Cybersecurity Skills Gap into Their Own Hands

What good are superior cybersecurity tools if there aren’t enough experts in the field to use them? Scott Edwards of Fortinet reveals how tech companies are taking the cybersecurity skills gap into their own hands.

CyberSecurity: How Smart Are Smart Homes? Not That Smart

After years of discussion, expectation and experimental products, it looks like the smart home is finally having its moment - particularly with popular adoption of devices like Google Home and Amazon Echo. Of course, these convenient and exciting devices are still new, and that means there are still bugs to work out. Where does this leave us?

Cybersecurity: Part Science, Part Business, and Part Psychic?

Bridging the talent gap means more than producing a diverse cybersecurity workforce today – it will require looking into the future of the criminal mind.

A Dialogue with Roland Cloutier - SVP & CSO of ADP

Learn how a powerful sense of mission can provide motivation to solve complex problems and meaning in the InfoSec life from ADP SVP/CSO Roland Cloutier.