How AIoT Will Reshape the Security Industry in 2023

The Internet of Things (IoT) has been around since 1990 — ever since John Romkey created a toaster that could be switched on over the internet. Today, 66% of North American homes have at least one IoT device, such as a smart speaker, bulb or watch. But for all their conveniences, many IoT devices are […]

The post How AIoT Will Reshape the Security Industry in 2023 appeared first on Security Intelligence.

Continue reading How AIoT Will Reshape the Security Industry in 2023

This is a Tough Year to Bet on Ecosystems (Premium)

With Big Tech reeling in the wake of the pandemic-era boom, Amazon, Google, and others are quietly backing away from ecosystems in which they’ve invested many billions of dollars over several years. But the impact on those customers who have embraced t… Continue reading This is a Tough Year to Bet on Ecosystems (Premium)

X-Force Identifies Vulnerability in IoT Platform

The last decade has seen an explosion of IoT devices across a multitude of industries. With that rise has come the need for centralized systems to perform data collection and device management, commonly called IoT Platforms. One such platform, ThingsBoard, was the recent subject of research by IBM Security X-Force. While there has been a […]

The post X-Force Identifies Vulnerability in IoT Platform appeared first on Security Intelligence.

Continue reading X-Force Identifies Vulnerability in IoT Platform

How Can the White House’s New IoT Labels Improve Security?

The White House’s National Security Council (NSC) is working on an ambitious project to improve consumer Internet of Things (IoT) security through industry-standard labeling. If successful, the labeling system will replace existing frameworks across the globe. Modeled after the EPA’s Energy Star labeling program, the IoT labeling initiative should have two effects: to educate and […]

The post How Can the White House’s New IoT Labels Improve Security? appeared first on Security Intelligence.

Continue reading How Can the White House’s New IoT Labels Improve Security?

4 Most Common Cyberattack Patterns from 2022

As 2022 comes to an end, cybersecurity teams globally are taking the opportunity to reflect on the past 12 months and draw whatever conclusions and insights they can about the threat landscape. It has been a challenging year for security teams. A major conflict in Europe, a persistently remote workforce and a series of large-scale […]

The post 4 Most Common Cyberattack Patterns from 2022 appeared first on Security Intelligence.

Continue reading 4 Most Common Cyberattack Patterns from 2022

White House rallies industry support for Internet of Things labeling effort

Executives from consumer electronic companies along with advocates and academics joined officials from the White House and FCC the meeting.

The post White House rallies industry support for Internet of Things labeling effort appeared first on CyberScoop.

Continue reading White House rallies industry support for Internet of Things labeling effort

White House to unveil ambitious cybersecurity labeling effort modeled after Energy Star

The Biden administration hopes the voluntary effort helps inform consumers and compels manufacturers to improve internet of things security.

The post White House to unveil ambitious cybersecurity labeling effort modeled after Energy Star appeared first on CyberScoop.

Continue reading White House to unveil ambitious cybersecurity labeling effort modeled after Energy Star

What You Should Know About the Honda Key Fob Vulnerability

As a cybersecurity writer, I’m more aware than the average person of the security risks with any connected device. So when I sat in my new car for the first time and saw all the different ways it linked to my phone or my home WiFi, more than a few red flags went up. I […]

The post What You Should Know About the Honda Key Fob Vulnerability appeared first on Security Intelligence.

Continue reading What You Should Know About the Honda Key Fob Vulnerability

Operational technology asset visibility fuels a capable cybersecurity program

New report offers insights into the vital role of asset visibility in protecting the entire operational technology environment.

The post Operational technology asset visibility fuels a capable cybersecurity program appeared first on CyberScoop.

Continue reading Operational technology asset visibility fuels a capable cybersecurity program

Beyond Shadow IT: Expert Advice on How to Secure the Next Great Threat Surface

You’ve heard all about shadow IT, but there’s another shadow lurking on your systems: Internet of Things (IoT) devices.  These smart devices are the IoT in shadow IoT, and they could be maliciously or unintentionally exposing information. Threat actors can use that to access your systems and sensitive data, and wreak havoc upon your company. […]

The post Beyond Shadow IT: Expert Advice on How to Secure the Next Great Threat Surface appeared first on Security Intelligence.

Continue reading Beyond Shadow IT: Expert Advice on How to Secure the Next Great Threat Surface