vulnerability assessment

The Metamorphosis of an Open Source Bot - Mirai to Persirai

The Mirai malware has become particularly notorious for recruiting IoT devices to form botnets that have launched some of the largest distributed denial of service (DDoS) attacks ever recorded. This new Experts Corner from Robert Hamilton tracks the evolution of the Mirai botnet.

A Dialogue with Tadd Wood

In this ITSPmagazine An InfoSec Life column, Tadd Wood shares his views on how data—and people—play a role in identifying risk and addressing cybersecurity issues.

IoT Pose A Threat To Anything And Everyone Connected

When it comes to the Internet of Things, it’s easy to identify the breadth and depth of the potential value of these connected things. It’s not so easy identifying the threats, risks, and related management solutions. Expert Chuck Brooks gives us his view into how to get a handle on these challenges.

Stuck in Cybersecurity Hell? Professional Education Is the Only Way Out

If we want to escape from “cyber hell” – then professionals will need additional training, not only to learn the latest technology, but also to understand public policy and organizational management. Howard Shrobe is looking to change this through professional education initiatives at MIT.

Protecting Data on IoT’s Rocky Road

Before rushing headlong into the Internet of Things, it's good to know what happens to the data that all those connected devices collect--and how to protect it.

Good Bots, Bad Bots, and Humans. Can You Tell Who Is Who?

Good Bots. Bad Bots. Can you tell those apart from the ‘normal’ traffic generated by the humans using your network? Sean Martin works with the team at Distil Networks to identify 10 ways to spot bad bots on your network?