9 Factors to Consider Before Choosing a UEM Solution

The more of your employees who work remotely some or all of the time, the more devices they’re likely to use to conduct business. Employees use their own devices as well as corporate ones, making already-challenged cybersecurity systems more complex. In response, IT teams need to rethink their approach to endpoint management. Changes in endpoint […]

The post 9 Factors to Consider Before Choosing a UEM Solution appeared first on Security Intelligence.

Continue reading 9 Factors to Consider Before Choosing a UEM Solution

6 Ways SASE Helps Protect Your Data

You start to log in to work from the home office you’ve occupied for the last two years only to sit and wait patiently as your virtual private network (VPN) dials up. After a few minutes, it validates your credentials. You have access to log in and you peruse your emails over coffee.   One […]

The post 6 Ways SASE Helps Protect Your Data appeared first on Security Intelligence.

Continue reading 6 Ways SASE Helps Protect Your Data

Unified Endpoint Management and Security: Thriving in a Work-From-Anywhere World

The hybrid workplace is here for the long-term, if not forever. Workers like the flexibility, and there are a lot of positives for business leaders in restructuring where and how people go about their jobs.  As much as workers like the hybrid workplace, it presents new challenges to security and IT teams. Management and security […]

The post Unified Endpoint Management and Security: Thriving in a Work-From-Anywhere World appeared first on Security Intelligence.

Continue reading Unified Endpoint Management and Security: Thriving in a Work-From-Anywhere World

FSB’s Fronton DDoS tool was actually designed for widespread ‘massive’ fake info campaigns, researchers say

The analysis shows that what was thought of as a straightforward DDoS tool was so much more.

The post FSB’s Fronton DDoS tool was actually designed for widespread ‘massive’ fake info campaigns, researchers say appeared first on CyberScoop.

Continue reading FSB’s Fronton DDoS tool was actually designed for widespread ‘massive’ fake info campaigns, researchers say

Hospital hallway robots get patches for potentially serious bugs

Five zero-days found in Aethon TUG robots included one that could allow an attacker to control the machines, Cynerio said.

The post Hospital hallway robots get patches for potentially serious bugs appeared first on CyberScoop.

Continue reading Hospital hallway robots get patches for potentially serious bugs

IoT Security and the Internet of Forgotten Things

In 2017, the number of connected devices surpassed the world’s human population. That’s a lot of things. However, many of them were not built with security in mind. It didn’t take long for attackers to take advantage of Internet of Things (IoT) vulnerabilities.  One case in 2016 saw threat actors take down Dyn, a company […]

The post IoT Security and the Internet of Forgotten Things appeared first on Security Intelligence.

Continue reading IoT Security and the Internet of Forgotten Things

Forescout acquires medical IoT security company CyberMDX

Silicon Valley cybersecurity company Forescout Technologies said Tuesday that it is acquiring CyberMDX, a medical-device security company known for its research into potential cyberthreats against health care technology. CyberMDX is a natural fit for Forescout, which focuses on securing connected devices and operational technology (OT) for large organizations — including what the industry calls the Internet of Medical Things (IoMT). Terms of the deal were not disclosed. “Cybersecurity for IoMT, much like cybersecurity for OT devices, requires specific expertise and technologies,” Forescout CEO Wael Mohamed said. “We are pleased to have the CyberMDX team join Forescout as we continue delivering new capabilities on our market-leading platform and grow our R&D center.” Research by CyberMDX has been responsible for shedding light on critical vulnerabilities in widely used medical imaging devices, patient monitors, anesthesia machines and infusion pumps. Forescout’s platform specializes in “device intelligence and network fabric technology,” or finding and classifying […]

The post Forescout acquires medical IoT security company CyberMDX appeared first on CyberScoop.

Continue reading Forescout acquires medical IoT security company CyberMDX

When it Comes to Stopping IoT Security Camera Breaches, Focus on Procurement

Earlier this year, an enterprise security camera system maker suffered a data breach. The incident, which involved the compromise of a Jenkins server, enabled a group of attackers to bypass the company’s authorization system, including its two-factor authentication processes. Those responsible for the compromise then abused their access to release the photos and videos of […]

The post When it Comes to Stopping IoT Security Camera Breaches, Focus on Procurement appeared first on Security Intelligence.

Continue reading When it Comes to Stopping IoT Security Camera Breaches, Focus on Procurement

IoT Security: Protecting Food and Agriculture Organizations

Ransomware actors are targeting food and agriculture organizations, potentially disrupting business. Luckily, there are already formal structures in place to boost the IoT security defenses they need. Knowing them keeps the lifeblood of industrial farms and food delivery going. Businesses in the sector could “suffer significant financial loss,” the FBI said. That loss is “resulting […]

The post IoT Security: Protecting Food and Agriculture Organizations appeared first on Security Intelligence.

Continue reading IoT Security: Protecting Food and Agriculture Organizations

Understanding the Cyber Risk Exposures Within the Health Care Industry

The health care industry is one of the most popular and lucrative targets for cyberattacks and malicious activity. Health care organizations always present as an attractive proposition to hackers as they possess high volumes of sensitive information about patients and rely on highly vulnerable medical devices. Advancements in medical procedures and the growth in digital […]

The post Understanding the Cyber Risk Exposures Within the Health Care Industry appeared first on Security Intelligence.

Continue reading Understanding the Cyber Risk Exposures Within the Health Care Industry