Your WiFi signals are revealing your location

The home may be the hearth, but it’s not going to be a place of safety for too long.

With the abundance of connected devices making their ways into our homes, increasing levels of data may allow for more accurate methods for remote surveillance. By measuring the strength of ambient …read more

Continue reading Your WiFi signals are revealing your location

Mobile Device Disposal: Best Practices for Burying BYOD Endpoints Without Risk

Reading Time: 4 minutes Traditional end-of-life procedures for corporate mobile devices can’t scale to BYOD. Learn how to avoid the risks that can occur during personal device disposal.

The post Mobile Device Disposal: Best Practices for Burying BYOD Endpoints Without Risk appeared first on Security Intelligence.

Continue reading Mobile Device Disposal: Best Practices for Burying BYOD Endpoints Without Risk

5 Keys to Improve Your Cybersecurity

Cybersecurity isn’t easy. If there was a product or service you could buy that would just magically solve all of your cybersecurity problems, everyone would buy that thing, and we could all rest easy.

However, that is not the way it works. Technology … Continue reading 5 Keys to Improve Your Cybersecurity

The Evolving Approach to IoT Security

The internet of things (IoT) brings has opened new horizons, from smart-city advancements to transforming how industries produce goods. For example, by connecting assets in a factory, manufacturers can have better insight into the health of their mach… Continue reading The Evolving Approach to IoT Security

SANS DFIR Summit 2018, Cindy Murphy’s ‘Digital Forensics Truths That Turn Out To Be Wrong’

Permalink
The post SANS DFIR Summit 2018, Cindy Murphy’s ‘Digital Forensics Truths That Turn Out To Be Wrong’ appeared first on Security Boulevard.
Continue reading SANS DFIR Summit 2018, Cindy Murphy’s ‘Digital Forensics Truths That Turn Out To Be Wrong’

The Danger and Opportunity in 5G Connectivity and IoT

The advent of 5G presents an opportunity for us to think the exploding number of IoT devices and how we securely connect to the digital world. Continue reading The Danger and Opportunity in 5G Connectivity and IoT

Bringing It All Back Home: Why You Should Apply Enterprise Network Security Policies to Your Smart Home

As threat actors increasingly target IoT devices to spread malware and facilitate DDoS attacks, it’s crucial to establish network security policies for your home IT just as you would at work.

The post Bringing It All Back Home: Why You Should Apply Enterprise Network Security Policies to Your Smart Home appeared first on Security Intelligence.

Continue reading Bringing It All Back Home: Why You Should Apply Enterprise Network Security Policies to Your Smart Home