iot

Protecting your network from IoT peer-to-peer vulnerabilities

In a recent article on Dark Reading, it was revealed that millions of IoT devices were exposed to a peer-to-peer (P2P) vulnerability. Given how wide-spread IoT devices are, and how device adoption will continue in organizations, it is important to understand the nature of these devices and how organizations can prevent these vulnerabilities from becoming …

Protecting your network from IoT peer-to-peer vulnerabilities Read More »

adamh

Detecting IoT_Reaper with Network Traffic Intelligence

Confidentiality, integrity, and availability are the three major components of information security. Over the years it has become easier to ensure the confidentiality of information via encryption, limiting data access to those who possess the correct key. Information integrity can be validated with a hash like MD5 or SHAxxx. If a file produces the same …

Detecting IoT_Reaper with Network Traffic Intelligence Read More »

bobn

Using NetFlow and Metadata Analysis to Reduce IoT Security Risks

The Internet of Things (IoT) describes the wide array of devices (beyond traditional computers and mobile phones) that are today, or will be in the future, connected to the internet. According to Gartner, there will be 20.4 billion connected devices by 2020. These internet-connected devices provide valuable functions that make people’s lives easier and improve …

Using NetFlow and Metadata Analysis to Reduce IoT Security Risks Read More »

Protecting our privacy in the Internet of Toys

It turns out, we were right; we just were looking at the wrong toys. In a recent article on Softpedia, Gabriela “Gaby” Vatu provides confirmation of what we have believed would happen with the continuing emergence of IoT. Effectively, internet-connected devices can collect vast troves of our data and become easily compromised, resulting in privacy …

Protecting our privacy in the Internet of Toys Read More »