Managing IoT Devices: A NetOps and SecOps Security Guide
The proliferation of IoT devices across enterprise networks has fundamentally changed the security and operational landscape for NetOps and SecOps teams. These interconnected devices—from...
The proliferation of IoT devices across enterprise networks has fundamentally changed the security and operational landscape for NetOps and SecOps teams. These interconnected devices—from...
The retail landscape has evolved dramatically over the past decade. What once was a straightforward network connecting point-of-sale systems and back-office operations has transformed...
In a recent article on Dark Reading, it was revealed that millions of IoT devices were exposed to a peer-to-peer (P2P) vulnerability. Given how...
It’s that time of year again. Employees have gone away from the office to spend time with friends and family. They will, of course,...
Recently, there has been an increase in distributed denial-of-service (DDoS) attacks that involve the use of compromised IoT devices like IP cameras, and it...
Confidentiality, integrity, and availability are the three major components of information security. Over the years it has become easier to ensure the confidentiality of...
The Internet of Things (IoT) describes the wide array of devices (beyond traditional computers and mobile phones) that are today, or will be in...
With billions of devices coming online yearly, the world of IoT (Internet of Things) is upon us. Unfortunately, like any new technology, form and...
Last week at the Cyber Security Summit in Denver, I participated in a panel that answered questions being asked by the moderator, David Cass –...
It turns out, we were right; we just were looking at the wrong toys. In a recent article on Softpedia, Gabriela “Gaby” Vatu provides...