How to Design IoT Security From the Ground Up

The Internet of Things (IoT) is a powerful boon to business. But it also represents a massive potential expansion of the cybersecurity attack surface. So far, IoT inclusion in many organizations has been poorly organized, haphazard and poorly planned. This needs to change. After all, IT security depends on IoT security.  Why IoT Security Is […]

The post How to Design IoT Security From the Ground Up appeared first on Security Intelligence.

Continue reading How to Design IoT Security From the Ground Up

What Video Doorbells Have to Teach Us About the Difficulties of IoT Security

The Amazon-owned smart home product manufacturer Ring recently announced that it’s strengthening the security of its Internet of Things (IoT) motion-detecting doorbell cameras by offering end-to-end encryption (E2EE) for streaming video footage. There’s a catch, though. Users who opt to turn on E2EE will find that they need to make major tradeoffs. Convenience and usefulness […]

The post What Video Doorbells Have to Teach Us About the Difficulties of IoT Security appeared first on Security Intelligence.

Continue reading What Video Doorbells Have to Teach Us About the Difficulties of IoT Security

Private 5G Security: Consider Security Risks Before Investing

So, 5G is one of those once-in-a-generation types of leaps that will alter how we operate. However, 5G security comes with a lot of challenges. Private 5G networks require us to look at attack surface management in a different way. How do they change the way we need to defend our data? And, what is […]

The post Private 5G Security: Consider Security Risks Before Investing appeared first on Security Intelligence.

Continue reading Private 5G Security: Consider Security Risks Before Investing

What Biden’s Cybersecurity Executive Order Means for Supply Chain Attacks

With cybersecurity guidelines coming down from the executive branch, industry and policymakers clearly both see the extent of the cyberattack problem. Take a look at the contents of the Biden administration’s May executive order and what it means for people working in the industry, especially in regards to supply chain attacks. The executive order covers […]

The post What Biden’s Cybersecurity Executive Order Means for Supply Chain Attacks appeared first on Security Intelligence.

Continue reading What Biden’s Cybersecurity Executive Order Means for Supply Chain Attacks

SSDF: The Key to Defending Against Supply Chain Cyberattacks

For reasons we all know, software supply chain attacks took on new meaning near the end of 2020. This hasn’t changed over this year. One of the best modern ways to combat these cyberattacks is to integrate a secure software development framework (SSDF) into a vendor’s software development life cycle (SDLC). Why is this such […]

The post SSDF: The Key to Defending Against Supply Chain Cyberattacks appeared first on Security Intelligence.

Continue reading SSDF: The Key to Defending Against Supply Chain Cyberattacks

Mandiant, CISA urge ThroughTrek customers to fix software bug in millions of baby monitors, cameras

A flaw in software used by millions of smart home devices could allow hackers to intercept audio and video data on equipment such as baby monitors and web cameras, security researchers said Tuesday. The vulnerability is in a software protocol made by Taiwanese internet of things (IoT) vendor ThroughTek, which has customers including the Chinese electronics giant Xiaomi. ThroughTek says 83 million devices made by other brands, such as the camera vendor Wyze, run its software. To exploit the flaw, an attacker would need “comprehensive knowledge” of the software protocol, and to obtain unique identifiers used by the targeted device, according to Mandiant, a division of FireEye, which discovered the issue. With that access, a hacker could communicate with devices remotely, potentially leading to follow-on hacks. The Department of Homeland Security plans to issue a public advisory to raise awareness of the security issue, Mandiant said. Yi-Ching Chen, an employee […]

The post Mandiant, CISA urge ThroughTrek customers to fix software bug in millions of baby monitors, cameras appeared first on CyberScoop.

Continue reading Mandiant, CISA urge ThroughTrek customers to fix software bug in millions of baby monitors, cameras

5 Ways to Defend Against Supply Chain Cyberattacks

Cutting corners happens, more so in high-stakes, high-speed jobs. But from employees honest enough to admit when they push vulnerable code live, we can put together a portfolio of products shipped broken. A new study by Osterman Research found a concerning trend — 81% of developers admitted to knowingly pushing vulnerable code live. And that […]

The post 5 Ways to Defend Against Supply Chain Cyberattacks appeared first on Security Intelligence.

Continue reading 5 Ways to Defend Against Supply Chain Cyberattacks

Health Care Security Must Mature With 5G

It’s clear that 5G technology is rapidly coming of age, and is enjoying wide adoption across every industry. According to Gartner, the market for 5G infrastructure was predicted to hit $4.2 billion over the past year, with two-thirds of companies depl… Continue reading Health Care Security Must Mature With 5G

Your Home Away From Home May Not Be as Cybersecure as You Think

Home is where the ‘smart’ is. A recent study revealed the average American household has 25 connected or Internet of Things (IoT) devices. The number of consumers who have smart home devices connected to their home internet has grown by 38% since the pandemic began. The findings don’t surprise Brad Ree, the chief technology officer […]

The post Your Home Away From Home May Not Be as Cybersecure as You Think appeared first on Security Intelligence.

Continue reading Your Home Away From Home May Not Be as Cybersecure as You Think

Understanding Global IoT Security Regulations

The IoT is maturing rapidly, and surveys show that global IoT spending will achieve a combined annual growth rate (CAGR) of 11.3% over the 2020-2024 forecast period. It offers promising benefits that are rapidly transforming a variety of industries, i… Continue reading Understanding Global IoT Security Regulations