Secure Devices in Response to WiFi Cyber Attacks

In the past year, IT admins and consumers have witnessed some pretty brutal cyber attacks. From new vulnerabilities in protocols to outdated devices and software, IT admins have been especially…
The post Secure Devices in Response to WiFi Cyber Attac… Continue reading Secure Devices in Response to WiFi Cyber Attacks

Disposing of Your Device: Don’t Throw the Data Out With the Old PC

Disposing of your device securely means wiping old data, deauthorizing account access and finding an ecologically sound home for the old device.

The post Disposing of Your Device: Don’t Throw the Data Out With the Old PC appeared first on Security Intelligence.

Continue reading Disposing of Your Device: Don’t Throw the Data Out With the Old PC

IoT Security: Who Is Stepping Up?

Government agencies, customers and device manufacturers must develop better IoT security practices to protect the growing number of connected devices.

The post IoT Security: Who Is Stepping Up? appeared first on Security Intelligence.

Continue reading IoT Security: Who Is Stepping Up?

IoT Security: Who Is Stepping Up?

Government agencies, customers and device manufacturers must develop better IoT security practices to protect the growing number of connected devices.

The post IoT Security: Who Is Stepping Up? appeared first on Security Intelligence.

Continue reading IoT Security: Who Is Stepping Up?

Secure Your IoT Deployment by Paying Attention to These Four Factors

It has never been more important to secure your IoT deployment. Challenges include lack of visibility, inexperience and the IoT’s increasing complexity.

The post Secure Your IoT Deployment by Paying Attention to These Four Factors appeared first on Security Intelligence.

Continue reading Secure Your IoT Deployment by Paying Attention to These Four Factors

FTC Studying Manufacturers’ Mobile Device Security Update Practices

The FTC recently mandated that eight major mobile device manufacturers in the U.S. reveal their security update practices and general update policies.

The post FTC Studying Manufacturers’ Mobile Device Security Update Practices appeared first on Security Intelligence.

Continue reading FTC Studying Manufacturers’ Mobile Device Security Update Practices

Identity and Access Management: Deciphering a Fluid Puzzle

The key to minimizing security vulnerabilities is the adoption of a layered cognitive approach to the wider identity and access management question.

The post Identity and Access Management: Deciphering a Fluid Puzzle appeared first on Security Intelligence.

Continue reading Identity and Access Management: Deciphering a Fluid Puzzle