With its study of over 30 types of devices, U.K. security firm Pen Test Partners concluded that DVRs remain a major IoT malware platform.
To effectively manage your IoT population, you must understand where your devices are, what they do, who is using them and how they connect to the network.
An 11-year-old boy used a clever Bluetooth hack to control his teddy bear and demonstrate that not even connected toys are immune to IoT security risks.
To protect sensitive data from emerging threats associated with the rise of the IoT, security analysts must adopt a centralized approach to UEM.
As the Internet of Things grows and mobile devices become increasingly connected, the security community must define who is responsible for IoT security.
If approached with a solid focus on security, the IoT has the potential to disrupt your business in a way that helps it become more efficient.
On April 10, Sierra Tel discovered that its IoT device modems had been bricked, possibly by a vigilante trying to neutralize rogue devices.
Smart cities offer big benefits for citizens and governments alike, but are they at increased risk of potentially crippling malware attacks?
Given the growing number of connected devices, organizations are beginning to leverage IoT data analytics to drive better decision-making.
The IoT is transforming before our eyes due to increasing regulations, growing demand for security standards and advancements in the telecom industry.