Mobile malware is nothing new. But in recent months, attackers have been getting more creative and resourceful with how they conceal, distribute and deploy these threats.
Smartphones, tablets and cloud computing have been leading the way in the workplace until now, but the growing popularity of the internet of things could totally change the look of IT infrastructure.
Securing IoT projects requires a thorough understanding of your technology infrastructure, its services and components, and how they relate to each other.
Many IT professionals and executives alike are not addressing IoT security at the same level at which it's creating tangible business risks.
We're only a few months into the year, but HIMSS19 and Think 2019 have already helped shape this year's focus on enterprise transformation, innovation and global cybersecurity.
As the internet of things (IoT) takes over the world, IoT security remains, well, pitiful. Organizations are failing to ensure that the networks and data generated by IoT devices remain protected.
Strong collaboration between IT and OT is a critical step in improving the security of critical infrastructure systems.
What can health care companies do to mitigate the risks inherent in the future of health care cybersecurity?
A group of threat actors known as Outlaw is using a Perl Shellbot to breach enterprise IoT devices.
A group of researchers from Princeton revealed that, through an attack dubbed MadIoT, threat actors could leverage an IoT botnet to compromise the power grid and cause widespread blackouts.