Don’t Leave Home Without These Five Travel Security Tips

Tourists should follow these travel security best practices to protect their devices and data from cybercriminals, especially in foreign countries.

The post Don’t Leave Home Without These Five Travel Security Tips appeared first on Security Intelligence.

Continue reading Don’t Leave Home Without These Five Travel Security Tips

Marine IoT, The Rolls Royce Concept: But, Where’s The Security?

While extraordinarily phenomenal – a conceptual marine-based IoT infrastructure via Rolls Royce – is superbly painted as the future portrait of intelligent shipping; but, there is a nagging question my fellow travelers: Where’s the security? Hat Tip
Pe… Continue reading Marine IoT, The Rolls Royce Concept: But, Where’s The Security?

Six Keys to Successful Identity Assurance – Broader Ecosystem

Earlier in this blog series, we discussed anomaly detection and machine learning focusing primarily on examples that included information you could expect to be available from the system that provides your identity assurance. It’s likely, however, that there is much more data that can be leveraged for making system access decisions in your current IT…

The post Six Keys to Successful Identity Assurance – Broader Ecosystem appeared first on Speaking of Security – The RSA Blog.

Continue reading Six Keys to Successful Identity Assurance – Broader Ecosystem

Think Twice Before Using Ohmconnect

I listen to @NPR throughout the day (on most days) and a story on Ohmconnect piqued my interest (it aired 5 days prior to this post). The TLDR on Ohmconnect is that it ostensibly helps you save energy by making you more aware of consumption and can be enabled to control various bits of IoT… Continue reading Continue reading Think Twice Before Using Ohmconnect