The Internet of Things (IoT) introduces a wealth of value as we look to make our digital lives more automated, streamlined, and easier. Unfortunately, with this value comes risk; risk that manifests itself not just in our personal lives, but in our professional business lives and in the industries and industrial settings that make it all possible. This article will cover the cybersecurity threats posed by data integrity in the era of IoT – particularly as it pertains to enterprise organizations and the industrial sector – and what organizations can do to mitigate the threats.
Financial institutions are suffering cyberattacks of such large volume and capabilities that simply adding more one-off security solutions to the stack will not be sufficient to detect and respond to data breaches. To stay a step ahead of cybercriminals, financial institutions should focus of the automation of threat intelligence to inform security updates as quickly as possible.
It has been two years since we first heard about one of the largest data breaches in the history of the federal government, hitting the Office of Personnel Management (OPM) and exposing the sensitive personal information of more than 22 million current and former employees. What's happened since then?
The Mirai malware has become particularly notorious for recruiting IoT devices to form botnets that have launched some of the largest distributed denial of service (DDoS) attacks ever recorded. This new Experts Corner from Robert Hamilton tracks the evolution of the Mirai botnet.
I just received a review sample of a toy that is—and this is not a word I use lightly—awesome. It's the Cozmo, a small robot that is just amazing. Isn't that adorable? But, what's the catch?
Ted Harrington recently ran The Boston Marathon – the oldest, most prestigious, arguably most important marathon in the world. According to Ted, it was by far one of the most fulfilling experiences of his entire life. Throughout the course of preparing for, attempting, and executing this feat, he noticed some striking parallels between running and entrepreneurship. This is his story.
These days, every report on the Internet of Things (IoT) reminds us that we are continuing to increase our connectivity to the Internet through everyday appliances, sensors, and wearables, despite rampant security risks. In this new Experts Corner, Scott Totzke looks at how already-vulnerable technologies are left wide open.
When technology evolves faster than our ability to make sure there's a viable level of safety, how do we educate businesses and the layperson on best practices for IoT security? In this part 2 InfoSec Life article, Phil Agcaoili, CISO, shares his views on the need to raise InfoSec awareness in society while striving for (and embracing) diversity in cybersecurity.
ITSPmagazine recently caught up withJoe Gray, Enterprise Security Consultant at Sword & Shield Enterprise Security. Joe shared his views on personal information sharing, privacy, and the value of community service for information security awareness throughout society.
Of the top disruptive technologies that will benefit from quantum computing, self-driving cars look most imminent as a commercial prospect. But how does this impact the hackability of these vehicles? Scott Totzke explains in his latest ITSPmagazine Experts Corner.
IoT security is certainly a challenging landscape. It was difficult enough to secure a select few smartphone operating systems like IOS and Android, but IoT is a whole new world with an unlimited number of non-standard device operating systems. Michael Lynch explores this world and the future it holds for the IoT device manufacturers.
2016 was an alarming year for tallying increases in data breaches and analyzing the sophistication of cybersecurity attacks and threats. In this Experts Corner, Chuck Brooks pulls together a collection of links highlighting some of the more alarming cybersecurity statistics.
Before rushing headlong into the Internet of Things, it's good to know what happens to the data that all those connected devices collect--and how to protect it.
After years of discussion, expectation and experimental products, it looks like the smart home is finally having its moment - particularly with popular adoption of devices like Google Home and Amazon Echo. Of course, these convenient and exciting devices are still new, and that means there are still bugs to work out. Where does this leave us?
Bridging the talent gap means more than producing a diverse cybersecurity workforce today – it will require looking into the future of the criminal mind.
Learn how a powerful sense of mission can provide motivation to solve complex problems and meaning in the InfoSec life from ADP SVP/CSO Roland Cloutier.
As 2016 comes to close, we are faced with many questions about what to expect in the coming year. Will malware ridden homes become the norm? Will mobile payments continue to mature and find their place in major organizations? Will we see physical injuries as a result of digital attacks? Mandeep Khera of Arxan shares his predictions with ITSPmagazine.