Calling all hardware startups! Apply to Hardware Battlefield @ TC Shenzhen

Got hardware? Well then, listen up, because our search continues for boundary-pushing, early-stage hardware startups to join us in Shenzhen, China for an epic opportunity; launch your startup on a global stage and compete in Hardware Battlefield at TC Shenzhen on November 11-12. Apply here to compete in TC Hardware Battlefield 2019. Why? It’s your chance […] Continue reading Calling all hardware startups! Apply to Hardware Battlefield @ TC Shenzhen

Is It Time to Start Certifying Connected Devices?

Connected devices go through hardware checks and certification before they hit the market. The same cannot be said for software checks, which begs the question: Is it time to start certifying devices?

The post Is It Time to Start Certifying Connected Devices? appeared first on Security Intelligence.

Continue reading Is It Time to Start Certifying Connected Devices?

This Is What Experts Say Will Turn the Tide Against Increasing Cyberthreats

Most organizations could blunt the vast majority of cyberthreats by making better use of the tools they already have and protecting their most precious data.

The post This Is What Experts Say Will Turn the Tide Against Increasing Cyberthreats appeared first on Security Intelligence.

Continue reading This Is What Experts Say Will Turn the Tide Against Increasing Cyberthreats

I Can’t Believe Mirais: Tracking the Infamous IoT Malware

Mirai malware is often perceived as a low-risk threat to enterprise security, but consumer devices in the home, when connected to corporate networks, can expose corporate networks to botnet attacks.

The post I Can’t Believe Mirais: Tracking the Infamous IoT Malware appeared first on Security Intelligence.

Continue reading I Can’t Believe Mirais: Tracking the Infamous IoT Malware

Mobile Device Management Evolves to Support New Device Use Cases

As new deployments of screens, IoT devices and other connected endpoints proliferate, mobile device management is key to helping businesses secure, manage and control new mobile-oriented use cases.

The post Mobile Device Management Evolves to Support New Device Use Cases appeared first on Security Intelligence.

Continue reading Mobile Device Management Evolves to Support New Device Use Cases

Meanwhile at the Plant…The Realities of Operational Security in the Age of Connected Machines

As OT environments, especially with legacy systems in place, become increasingly connected, they may inherit OT security risks that were previously the domain of the IT environment.

The post Meanwhile at the Plant…The Realities of Operational Security in the Age of Connected Machines appeared first on Security Intelligence.

Continue reading Meanwhile at the Plant…The Realities of Operational Security in the Age of Connected Machines

Putting the ‘S’ in IoT: How to Make Internet of Things Solutions Secure by Design

When developing and deploying internet of things solutions, achieving security by design is not as simple as picking a secure development life cycle (SDLC) framework and shifting your security left.

The post Putting the ‘S’ in IoT: How to Make Internet of Things Solutions Secure by Design appeared first on Security Intelligence.

Continue reading Putting the ‘S’ in IoT: How to Make Internet of Things Solutions Secure by Design

High Stakes, Rising Risks: The Ripple Effects of Cybersecurity in the Healthcare Sector

Is providing effective cybersecurity for the healthcare sector an IT problem or a wider-scope issue? The short answer is that it’s both.

The post High Stakes, Rising Risks: The Ripple Effects of Cybersecurity in the Healthcare Sector appeared first on Security Intelligence.

Continue reading High Stakes, Rising Risks: The Ripple Effects of Cybersecurity in the Healthcare Sector

Industrial Control Systems Security: To Test or Not to Test?

According to X-Force Red data, the number of vulnerabilities exposing industrial control systems has increased 83 percent since 2011. Should organizations test them and risk destabilizing operations?

The post Industrial Control Systems Security: To Test or Not to Test? appeared first on Security Intelligence.

Continue reading Industrial Control Systems Security: To Test or Not to Test?

Preparing for the Unpredictable: Security in a New World of Mobile Malware

Mobile malware is nothing new. But in recent months, attackers have been getting more creative and resourceful with how they conceal, distribute and deploy these threats.

The post Preparing for the Unpredictable: Security in a New World of Mobile Malware appeared first on Security Intelligence.

Continue reading Preparing for the Unpredictable: Security in a New World of Mobile Malware