Connect the Dots: IoT Security Risks in an Increasingly Connected World

Although connected devices make our daily lives easier, IoT data, if not properly secured, can cause serious financial and reputational damage to companies deploying and manufacturing this technology.

The post Connect the Dots: IoT Security Risks in an Increasingly Connected World appeared first on Security Intelligence.

Continue reading Connect the Dots: IoT Security Risks in an Increasingly Connected World

At Your Own Risk: Managing Internet of Things (IoT) Risks for Industrial and Utility Companies

A new IBM Institute of Business Value (IBV) report found that many energy and utilities companies are unprepared to deal with Internet of Things (IoT) threats.

The post At Your Own Risk: Managing Internet of Things (IoT) Risks for Industrial and Utility Companies appeared first on Security Intelligence.

Continue reading At Your Own Risk: Managing Internet of Things (IoT) Risks for Industrial and Utility Companies

Securing Mobile Transactions and Payments in the Age of Connected Devices

Simple security best practices can go a long way toward securing mobile transactions and payments for both consumers and service providers.

The post Securing Mobile Transactions and Payments in the Age of Connected Devices appeared first on Security Intelligence.

Continue reading Securing Mobile Transactions and Payments in the Age of Connected Devices

How Israel Became the Land of Connected Car Research and Development

With its many manufacturer-sponsored test labs, smart car startups and military imperatives, Israel is becoming a major hub for connected car research.

The post How Israel Became the Land of Connected Car Research and Development appeared first on Security Intelligence.

Continue reading How Israel Became the Land of Connected Car Research and Development

Securing Medical Devices in the Age of the IoT

Both health care IT professionals and device manufacturers are responsible for securing medical devices in light of emerging IoT threats.

The post Securing Medical Devices in the Age of the IoT appeared first on Security Intelligence.

Continue reading Securing Medical Devices in the Age of the IoT

Investigating IoT Crime in the Age of Connected Devices

To fight IoT crime, security professionals must properly classify incidents and connect seemingly disparate strings of evidence.

The post Investigating IoT Crime in the Age of Connected Devices appeared first on Security Intelligence.

Continue reading Investigating IoT Crime in the Age of Connected Devices

Is My Fitness Band Protected? An Exercise in IoT Security

Connected devices such as fitness bands hold the potential to revolutionize daily life, but they also pose IoT security risks.

The post Is My Fitness Band Protected? An Exercise in IoT Security appeared first on Security Intelligence.

Continue reading Is My Fitness Band Protected? An Exercise in IoT Security

Internet-Connected Toys: Cute, Cuddly and Inherently Insecure

Internet-connected toys may be cute and cuddly, but they can also be hijacked by malicious actors to spy on children and their parents.

The post Internet-Connected Toys: Cute, Cuddly and Inherently Insecure appeared first on Security Intelligence.

Continue reading Internet-Connected Toys: Cute, Cuddly and Inherently Insecure