What is Secure Boot? It’s Where IoT Security Starts | Keyfactor

Connected IoT devices can be found in every aspect of modern digital life. From autonomous and connected vehicles to medical devices to smart meters and smartwatches. The data generated and the processes controlled by these devices have never been… Continue reading What is Secure Boot? It’s Where IoT Security Starts | Keyfactor

The Key to Firmware Security in Connected IoT Devices | Keyfactor

IoT devices make up 30% of all network-connected endpoints, introducing novel attacks and supply chain vulnerabilities that make many companies primary targets for cybercriminals. To address this increasing threat surface, every organization deplo… Continue reading The Key to Firmware Security in Connected IoT Devices | Keyfactor

Survey Finds Low Confidence in Medical Device Security

As more medical devices connect to the Internet, the role of cybersecurity in the health care sector has never been more critical. Unfortunately, a survey of 50 senior executives at U.S. Fortune 1000 companies found only 18% of respondents believed th… Continue reading Survey Finds Low Confidence in Medical Device Security

How can we prevent sophisticated document fraud in 2021?

Document fraud such as forgery is becoming more sophisticated every year. We discuss how to stay ahead of scammers.
The post How can we prevent sophisticated document fraud in 2021? appeared first on Security Boulevard.
Continue reading How can we prevent sophisticated document fraud in 2021?

New IoT Legislation Means Advance Planning is Key

As 2020 wound to a close, the year’s end marked a major milestone in strengthening the security of Internet of Things (IoT) devices and systems. In December, the IoT Cybersecurity Improvement Act was signed into law, raising the priority of cybersecur… Continue reading New IoT Legislation Means Advance Planning is Key

Hacking Christmas Gifts: Brushing with Bluetooth

If high-tech gadgets are on your holiday shopping list, it is worth taking a moment to think about the particular risks they may bring. Under the wrong circumstances, even an innocuous gift may introduce unexpected vulnerabilities. In this blog series,… Continue reading Hacking Christmas Gifts: Brushing with Bluetooth

Overcoming IoT Asset Management Challenges

The ability to track anything — from the level of coffee left in your pot to a real-time inventory of goods in a warehouse — is compelling in any industry. With the number of IoT devices expected to reach 55.7 billion worldwide by 2025, security teams… Continue reading Overcoming IoT Asset Management Challenges

The Fourth Industrial Revolution – AI, Quantum, and IoT Impacts on Cybersecurity

The next cybersecurity challenge lies with the advances in quantum computing that are set to revolutionize tech while simultaneously equipping threat actors with a new arsenal of cyberweapons.
The post The Fourth Industrial Revolution – AI, Quantum, an… Continue reading The Fourth Industrial Revolution – AI, Quantum, and IoT Impacts on Cybersecurity