Mirai malware is often perceived as a low-risk threat to enterprise security, but consumer devices in the home can expose corporate networks to botnet attacks.
As new deployments of screens, IoT devices and other connected endpoints proliferate, mobile device management is key to helping businesses secure, manage and control new mobile-oriented use cases.
To best manage mobile security within your enterprise, you need to maintain balance between technology, enterprise and user responsibilities.
Retailers are leveraging the IoT to improve the customer experience, realize efficiencies and grow business. The catch: The more connected devices on the network, the greater the IoT security risk.
If you accept that 5G technology comes with three inherent challenges — manageability, the supply chain and usage — then the endpoint protection challenge makes a whole lot more sense.
The increasing connectedness of tools and devices is expanding the threat surface and introducing IoT security risks to operational technology environments.
With more devices outside the corporate perimeter and more apps stored in the public cloud, organizations must abandon on-premises security for new conditional access models to achieve zero trust.
IoT security is now a hot topic, but beyond the hype and hyperbole, how can enterprises effectively secure connected networks and safeguard IoT devices?
The Outlaw threat group is using a botnet to distribute a Monero cryptocurrency miner and a Perl-based backdoor component.
In addition to oil and gas companies, the XENOTIME threat group has begun targeting electric utility organizations located in the U.S. and elsewhere.