The car of today — and especially tomorrow — relies on countless lines of software code to get those wheels moving, a reality that has placed increasing importance on automotive cybersecurity.
Bringing It All Back Home: Why You Should Apply Enterprise Network Security Policies to Your Smart Home
As threat actors increasingly target IoT devices to spread malware and facilitate DDoS attacks, it's crucial to establish network security policies for your home IT just as you would at work.
The smart office market is forecast to double by 2023. But while IoT devices promise to bring a bevy of benefits, they also introduce entirely new categories of cyber risk.
At Black Hat 2018 and DEF CON 26, experts shared insights about IoT security risks and vulnerabilities and offered advice to help organizations and consumers navigate our increasingly connected world.
Governments must embrace an immune system approach centered on security intelligence to stay ahead of advanced cyberthreats looking to breach the ever-widening perimeter of smart cities.
Although connected devices make our daily lives easier, IoT data, if not properly secured, can cause serious financial and reputational damage to companies deploying and manufacturing this technology.
The introduction of smart assistants into the workplace is inevitable, and while they do carry unique risks, they are no more severe than the risks associated with widely deployed IoT devices.
To fight IoT crime, security professionals must properly classify incidents and connect seemingly disparate strings of evidence.
Connected devices such as fitness bands hold the potential to revolutionize daily life, but they also pose IoT security risks.
The upcoming release of Apple iOS 11 will bring significant changes to the enterprise in the form of enhanced customization, discoverability and more.