Building the IoT monster

When Mary Shelley wrote Frankenstein, she imagined the misguided doctor assembling his creature from dead body parts, who instead of elevating science, created something dark and terrible. A modern day Mary might well imagine the monster being assembled, not from arms and legs, from nanny-cams, door locks, and DVRs. It would be hard to miss the events of the past few weeks. In September, security reporter Brian Krebs was hit by a massive DDoS attack. … More Continue reading Building the IoT monster

Democracy for the Internet of Things

In the past I’ve written a number of times on the way that the IoT potentially changes the relationship between governments and their constituents – and a profound change that will be. Yet, this change is a two way street and perhaps the IoT will open the door to a more direct kind of democracy, where citizens and government are more intimately and inextricably linked. An August 2016 article published by the Pew Research Foundation … More Continue reading Democracy for the Internet of Things

IoT-based DDoS attacks on the rise

Cybercriminal networks are increasingly taking advantage of lax Internet of Things device security to spread malware and create zombie networks, or botnets, unbeknownst to their device owners. When lax security becomes a huge problem Symantec’s Security Response team has discovered that cybercriminals are hijacking home networks and everyday consumer connected devices to help carry out DDoS attacks on more profitable targets, usually large companies. To succeed, they need cheap bandwidth and get it by stitching … More Continue reading IoT-based DDoS attacks on the rise

Organizations sacrificing security for the speed of business

Organizations know how to improve security. However, due to pressures caused by the rate of business change, including the adoption of new technologies and applications, organizations are sacrificing security for the speed of business, according to the Ponemon Institute. Why organizations are at risk “All enterprise organizations are under pressure to drive business innovation in order to respond to changes in the competitive landscape, and to meet changing customer expectations,” said Dr. Larry Ponemon, chairman … More Continue reading Organizations sacrificing security for the speed of business

IoT Village uncovers 47 security vulnerabilities across 23 devices

New dangers in both home security and municipal power facilities were revealed as the results of the 2nd Annual IoT Village, held at DEF CON 24 in Las Vegas. More than 47 new vulnerabilities were discovered across 23 different devices from 21 brand name manufacturers. Between talks, workshops, and onsite hacking contests, IoT Village’s goal is to uncover security vulnerabilities in order to draw attention to the need for greater security considerations in the devices … More Continue reading IoT Village uncovers 47 security vulnerabilities across 23 devices

Micro Focus merger with HPE’s Software Business Segment worth $8.8 billion

Micro Focus announced today its intent to merge with HPE’s Software Business Segment in a transaction valued at approximately $8.8 billion. The merger is subject to customary closing conditions, including anti-trust clearances and shareholder approval and is expected to close in Q3 2017. The proposed merger brings together two well established enterprise software vendors with highly complementary portfolios. With revenues of approximately $4.5 billion, it creates one of the world’s largest pure-play infrastructure software companies … More Continue reading Micro Focus merger with HPE’s Software Business Segment worth $8.8 billion

The explosive growth of the IoT security market

The IoT security market is estimated to grow from USD 7.90 billion in 2016 to USD 36.95 billion by 2021, at a CAGR of 36.1%, according to MarketsandMarkets. The major forces driving the IoT security market are rise in security concerns for critical infrastructures such as utilities, smart grids, and manufacturing facilities and stringent regulations and compliance requirements. Nowadays, cloud-based security solutions are providing good opportunities for the growth of the IoT security market by … More Continue reading The explosive growth of the IoT security market

The IoT blame game

The first Friday the thirteenth of any year is officially “Blame Someone Else Day.” What a delightful thought – that all the failures, inconsistencies, and ill-advised schemes hatched in the previous 12 months could be legitimately handed off to that universal sink of all blame: “someone else.” After all, apportioning blame helps us deal with the event itself – it turns the unmanageable into the explicable – taking away the sting of the event, and … More Continue reading The IoT blame game

Why outsource risk management to people who don’t care?

The 2015 Cost of Cyber Crime Study by the Ponemon Institute reported that 50% of companies have implemented some sort of access governance technology. It fell 4th on the list in terms of ROI that people were getting from governance. The implementation trend is driven primarily by compliance. In this podcast recorded at RSA Conference 2016, Travis Greene, Identity Solutions Strategist at Micro Focus, discusses why is it that in the process of implementing access … More Continue reading Why outsource risk management to people who don’t care?