X-Force Identifies Vulnerability in IoT Platform

The last decade has seen an explosion of IoT devices across a multitude of industries. With that rise has come the need for centralized systems to perform data collection and device management, commonly called IoT Platforms. One such platform, ThingsBoard, was the recent subject of research by IBM Security X-Force. While there has been a […]

The post X-Force Identifies Vulnerability in IoT Platform appeared first on Security Intelligence.

Continue reading X-Force Identifies Vulnerability in IoT Platform

How Can the White House’s New IoT Labels Improve Security?

The White House’s National Security Council (NSC) is working on an ambitious project to improve consumer Internet of Things (IoT) security through industry-standard labeling. If successful, the labeling system will replace existing frameworks across the globe. Modeled after the EPA’s Energy Star labeling program, the IoT labeling initiative should have two effects: to educate and […]

The post How Can the White House’s New IoT Labels Improve Security? appeared first on Security Intelligence.

Continue reading How Can the White House’s New IoT Labels Improve Security?

Beyond Shadow IT: Expert Advice on How to Secure the Next Great Threat Surface

You’ve heard all about shadow IT, but there’s another shadow lurking on your systems: Internet of Things (IoT) devices.  These smart devices are the IoT in shadow IoT, and they could be maliciously or unintentionally exposing information. Threat actors can use that to access your systems and sensitive data, and wreak havoc upon your company. […]

The post Beyond Shadow IT: Expert Advice on How to Secure the Next Great Threat Surface appeared first on Security Intelligence.

Continue reading Beyond Shadow IT: Expert Advice on How to Secure the Next Great Threat Surface

When it Comes to Stopping IoT Security Camera Breaches, Focus on Procurement

Earlier this year, an enterprise security camera system maker suffered a data breach. The incident, which involved the compromise of a Jenkins server, enabled a group of attackers to bypass the company’s authorization system, including its two-factor authentication processes. Those responsible for the compromise then abused their access to release the photos and videos of […]

The post When it Comes to Stopping IoT Security Camera Breaches, Focus on Procurement appeared first on Security Intelligence.

Continue reading When it Comes to Stopping IoT Security Camera Breaches, Focus on Procurement

IoT Security: Protecting Food and Agriculture Organizations

Ransomware actors are targeting food and agriculture organizations, potentially disrupting business. Luckily, there are already formal structures in place to boost the IoT security defenses they need. Knowing them keeps the lifeblood of industrial farms and food delivery going. Businesses in the sector could “suffer significant financial loss,” the FBI said. That loss is “resulting […]

The post IoT Security: Protecting Food and Agriculture Organizations appeared first on Security Intelligence.

Continue reading IoT Security: Protecting Food and Agriculture Organizations

How to Design IoT Security From the Ground Up

The Internet of Things (IoT) is a powerful boon to business. But it also represents a massive potential expansion of the cybersecurity attack surface. So far, IoT inclusion in many organizations has been poorly organized, haphazard and poorly planned. This needs to change. After all, IT security depends on IoT security.  Why IoT Security Is […]

The post How to Design IoT Security From the Ground Up appeared first on Security Intelligence.

Continue reading How to Design IoT Security From the Ground Up

What Video Doorbells Have to Teach Us About the Difficulties of IoT Security

The Amazon-owned smart home product manufacturer Ring recently announced that it’s strengthening the security of its Internet of Things (IoT) motion-detecting doorbell cameras by offering end-to-end encryption (E2EE) for streaming video footage. There’s a catch, though. Users who opt to turn on E2EE will find that they need to make major tradeoffs. Convenience and usefulness […]

The post What Video Doorbells Have to Teach Us About the Difficulties of IoT Security appeared first on Security Intelligence.

Continue reading What Video Doorbells Have to Teach Us About the Difficulties of IoT Security

Cyber Monday is Every Monday: Securing the ‘New Normal’

From eCommerce threats, to attacks at the smart edge, Fortinet researchers discuss the top evolving threats of 2020, heading into the new year. Continue reading Cyber Monday is Every Monday: Securing the ‘New Normal’

The U.S. Government is Creating Security Standards for IoT Devices

A new Internet of Things bill directs NIST to create minimum cybersecurity standards for IoT devices owned or controlled by the U.S. government.
The post The U.S. Government is Creating Security Standards for IoT Devices appeared first on Nozomi Networ… Continue reading The U.S. Government is Creating Security Standards for IoT Devices

Bluetooth Spoofing Bug Affects Billions of IoT Devices

The ‘BLESA’ flaw affects the reconnection process that occurs when a device moves back into range after losing or dropping its pairing, Purdue researchers said. Continue reading Bluetooth Spoofing Bug Affects Billions of IoT Devices