As the internet of things (IoT) takes over the world, IoT security remains, well, pitiful. Organizations are failing to ensure that the networks and data generated by IoT devices remain protected.
Strong collaboration between IT and OT is a critical step in improving the security of critical infrastructure systems.
What can health care companies do to mitigate the risks inherent in the future of health care cybersecurity?
A group of threat actors known as Outlaw is using a Perl Shellbot to breach enterprise IoT devices.
A group of researchers from Princeton revealed that, through an attack dubbed MadIoT, threat actors could leverage an IoT botnet to compromise the power grid and cause widespread blackouts.
Bringing It All Back Home: Why You Should Apply Enterprise Network Security Policies to Your Smart Home
As threat actors increasingly target IoT devices to spread malware and facilitate DDoS attacks, it's crucial to establish network security policies for your home IT just as you would at work.
The smart office market is forecast to double by 2023. But while IoT devices promise to bring a bevy of benefits, they also introduce entirely new categories of cyber risk.
At Black Hat 2018 and DEF CON 26, experts shared insights about IoT security risks and vulnerabilities and offered advice to help organizations and consumers navigate our increasingly connected world.
Researchers from Threatcare and IBM X-Force Red joined forces to test several smart city devices, with the goal of investigating "supervillain-level" attacks. Here's what the teams found.
Security researchers identified two new threats in the wild that are designed to compromise consumer devices to build IoT botnets.