IT leaders should make a security resolution to improve basic hygiene, back up data regularly and share threat information to fight cybercrime in 2017.
The top three cybercrime threats of 2016 shed some light on what happened in the past 12 months — and what to expect in the year ahead.
In 2016, the year of the DDoS attack, cybercriminals hijacked millions of IoT devices to create massive botnets they used to take down popular websites.
It has never been more important to secure your IoT deployment. Challenges include lack of visibility, inexperience and the IoT's increasing complexity.
Bluetooth security is not strong enough to keep fraudsters from eavesdropping on sensitive communications. The upcoming Bluetooth 5 offers enhancements.
Cybercriminals recently discovered how to modify the Mirai botnet source code, which leaked in September, to compromise devices remotely via TCP port 7547.
The Department of Homeland Security (DHS) recently issued a set of nonbinding principles for securing the internet of things (IoT).
The third wave of the internet requires an approach to identity management that recognizes the need to share PII selectively to maximize its value.
The rapid growth of the Indian IoT market is encouraging, but more connected devices mean more vulnerabilities for cybercriminals to exploit.
It's important to consider factors related to operations and infrastructure, not just threats, when discussing grid security for the utilities industry.