An ideal IoT security solution seamlessly integrates all stages of the IoT lifecycle - from discovery of IoT devices and their associated risks to security actions that enforce protections and defend these devices from known and unknown threats.
Download this guide for fresh insights on:
Shortcomings within...
The steady barrage of acquisition reports around publicly traded digital experience vendor Akamai has intensified in recent weeks. The latest salvo landed Monday when StreetInsider reported that the intelligent edge platform provider held talks with a private equity firm about a potential takeover.
"It's stupid and adds zero value," writes Ian Keller, director of security at a telecom company, about connecting hospital networks - and especially life-sustaining information - to the internet. He encourages CISOs to be socially responsible about their moral obligation to patients.
Written for CISOs, IT operations, and cybersecurity professionals
This free eBook details the right people, processes, and technologies you need to plan and execute an advanced PAM program. Incorporating Delinea's experience with thousands of PAM customers (including half of Fortune 100) worldwide, this eBook...
Security researchers revealed yet another method for stealing a Tesla although the brand is one of the least-stolen cars and among the most recovered once pilfered. The newest example comes from internet of things security company IOActive in an attack involving two people and customized gear.
Vulnerabilities in certain medication infusion pump products from manufacturer Baxter could compromise a hospital's biomedical network. The flaws highlight the risks involving the acquisition and disposal of medical technology, says researcher Deral Heiland of Rapid7.
Attackers could block access to every Contec patient monitoring device connected to a hospital network by sending a single malformed packet, security researchers warn. U.S. authorities say China-based Contec hasn't responded to outreach to fix the flaws.
IoT deployments cause constant security concern, due to their frequent use as attack vectors for bad actors to gain access to broader network resources. Traditional security measures relying on agents and software updates pose challenges to manage and control on always-on, open IoT devices.
A new wireless WAN...
Federal authorities, in two separate advisories issued Thursday, urge healthcare sector entities to proactively address security risks from internet of things devices equipped with sensors, software and other technologies to connect and exchange data over the internet and from open web applications.
John Kindervag, creator of zero trust and senior vice president at ON2IT, and Grant Schneider, senior director at Venable, join ISMG editors to discuss the latest Log 4j findings, threats posed by a Chinese-made automotive GPS tracker and the challenges of a distributed workforce.
In this era of Digital Transformation as our reliance on digital systems and technology increases, we see that it’s only cyberattacks that have broken away from this dependency and are exceeding in terms of both scale and severity.
Organizations, thought leaders and C-Suite officials are struggling to keep up...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.