Connected devices such as fitness bands hold the potential to revolutionize daily life, but they also pose IoT security risks.
According to a recent survey by the Ponemon Institute, IoT security needs will drive increased use of public key infrastructure over the next two years.
Internet-connected toys may be cute and cuddly, but they can also be hijacked by malicious actors to spy on children and their parents.
Many health care security risks stem from insufficient leadership and limited resources, which can often be attributed to a lack of security awareness.
Companies and governments around the world must test their cloud security capabilities to keep sensitive data safe from hacktivists and cyber enemies.
In today's complex ecosystem of connected devices, cybersecurity is a key consideration for consumers when shopping for products and services.
Security measures are most effective when built in during the design phase. To achieve this, companies must understand basic facts about IoT security.
IT decision-makers should invest in reliable tools and the help of trusted experts to respond to emerging IoT security challenges.
The SHELLBIND Trojan exploits a recently patched Samba vulnerability to steal data from connected network-attached storage (NAS) devices.
A new open source vulnerability called Devil's Ivy could enable attackers to hijack security camera feeds and block legitimate users from accessing data.