Researchers discovered a Mirai malware variant with 18 exploits targeting embedded internet of things (IoT) devices.
When developing and deploying internet of things solutions, achieving security by design is not as simple as picking a secure development life cycle (SDLC) framework and shifting your security left.
According to X-Force Red data, the number of vulnerabilities exposing industrial control systems has increased 83 percent since 2011. Should organizations test them and risk destabilizing operations?
To prepare for the CCPA and other upcoming data privacy regulations, start by applying the best practices and frameworks you used to achieve GDPR readiness when the regulation took effect last May.
Securing IoT projects requires a thorough understanding of your technology infrastructure, its services and components, and how they relate to each other.
Let's add the diversity of approach, diversity of values and advocacy for deep customer empathy to the cybersecurity workforce diversity we are building.
Failure to consider security when developing a hybrid cloud can lead to unanticipated problems that don't exist in typical technology infrastructure.
Regulators and digital coin exchanges should build robust cryptocurrency security into their systems to protect themselves and individual investors from theft and fraud.
To transform your security strategy, you must first establish a model of shared responsibility between security professionals and business units throughout the organization.
Blockchain technology depends on mutual trust between human participants, each of whom represents a potential weakness in the chain.