5 IoT Security Conferences You Don’t Want to Miss

If you’re a CISO, you should consider attending an IoT security conference to learn from the leaders in the field about how to integrate IoT security into your threat management program.

The post 5 IoT Security Conferences You Don’t Want to Miss appeared first on Security Intelligence.

Continue reading 5 IoT Security Conferences You Don’t Want to Miss

Your 2019 Essential Software Security, Development, & DevOps Conferences

“DevOps” encompasses a wide range of topics – throw security in there and you’ve added even more. This roundup includes events throughout the year and around the globe, from small events to community conferences and up. Whether … Continue reading Your 2019 Essential Software Security, Development, & DevOps Conferences

DeepLocker: new breed of malware that uses AI to fly under the radar

IBM researchers are seeking to raise awareness that AI-powered threats are coming our way soon. To that end, they’ve created an all-new breed of malware to provide insights into how to reduce risks and deploy adequate countermeasures. DeepLocker … Continue reading DeepLocker: new breed of malware that uses AI to fly under the radar

Black Hat 2018: With Healthcare Security Flaws, Safety’s Increasingly at Stake

Vulnerabilities in healthcare devices and hospital systems are leading to growing concerns in the infosec community about patient safety. Continue reading Black Hat 2018: With Healthcare Security Flaws, Safety’s Increasingly at Stake

How to Outsmart the Smart City

Researchers from Threatcare and IBM X-Force Red joined forces to test several smart city devices, with the goal of investigating “supervillain-level” attacks. Here’s what the teams found.

The post How to Outsmart the Smart City appeared first on Security Intelligence.

Continue reading How to Outsmart the Smart City