All iot

Protecting your network from IoT peer-to-peer vulnerabilities

In a recent article on Dark Reading, it was revealed that millions of IoT devices were exposed to a peer-to-peer (P2P) vulnerability. Given how...

holidays

Securing the network from new devices

It’s that time of year again. Employees have gone away from the office to spend time with friends and family. They will, of course,...

threat surface

How to reduce your IoT threat surface

Recently, there has been an increase in distributed denial-of-service (DDoS) attacks that involve the use of compromised IoT devices like IP cameras, and it...

adamh

Detecting IoT_Reaper with Network Traffic Intelligence

Confidentiality, integrity, and availability are the three major components of information security. Over the years it has become easier to ensure the confidentiality of...

bobn

Using NetFlow and Metadata Analysis to Reduce IoT Security Risks

The Internet of Things (IoT) describes the wide array of devices (beyond traditional computers and mobile phones) that are today, or will be in...

jarryd

IoT Security with NetFlow/IPFIX

With billions of devices coming online yearly, the world of IoT (Internet of Things) is upon us. Unfortunately, like any new technology, form and...

jeffm

Cyber Security Questions – Denver Panel

Last week at the Cyber Security Summit in Denver, I participated in a panel that answered questions being asked by the moderator, David Cass –...

Protecting our privacy in the Internet of Toys

It turns out, we were right; we just were looking at the wrong toys. In a recent article on Softpedia, Gabriela “Gaby” Vatu provides...

VTech Breach, Hacking Barbies, and Internet of Things Security

Late last month on Black Friday, Hong Kong-based toymaker VTech suffered a data breach.  Sure, we can just dump it into the ever-expanding list...