Why It’s Time to Adopt IoT Security by Design

We encounter the IoT in myriad forms as we go about our daily routine, from sensors to smart vehicles, which is why businesses and manufacturers need to work together to adopt IoT security by design.

The post Why It’s Time to Adopt IoT Security by Design appeared first on Security Intelligence.

Continue reading Why It’s Time to Adopt IoT Security by Design

10 Differences Between Digital Transformation Leaders and Laggards

Research shows that there are many differences between the best-of-class enterprises leading the way in digital transformation and their peers, who are falling behind.

The post 10 Differences Between Digital Transformation Leaders and Laggards appeared first on Security Intelligence.

Continue reading 10 Differences Between Digital Transformation Leaders and Laggards

Smarter Devices, Smarter Fraud: Overlooked Threats in IoT Security

Many manufacturers of connected devices fail to recognize the IoT security implications of customers tinkering with their products.

The post Smarter Devices, Smarter Fraud: Overlooked Threats in IoT Security appeared first on Security Intelligence.

Continue reading Smarter Devices, Smarter Fraud: Overlooked Threats in IoT Security

What are the security implications of allowing API consumer to decide primary key stored in database?

Story

We are developing an API that which allow consumer to create or modify (i.e. upsert) objects stored in database via an endpoint with HTTP PUT.

The primary key of the object stored in this way is a GUID instead of an a… Continue reading What are the security implications of allowing API consumer to decide primary key stored in database?

is there a name for security principle of "balance-preserving functions"? (e.g. for bank balances)

Suppose you are designing software to manage bank balances for different accounts belonging to a given customer. A single customer can have multiple accounts with a bank, such as a credit card account, a checking account, an… Continue reading is there a name for security principle of "balance-preserving functions"? (e.g. for bank balances)

Considering Container Security? 6 Ways to Make a Case for Containerization

Reading Time: 5 minutes Containerization can create a pathway to secure digital transformation. Discover how to make a business case for container security.

The post Considering Container Security? 6 Ways to Make a Case for Containerization appeared first on Security Intelligence.

Continue reading Considering Container Security? 6 Ways to Make a Case for Containerization

Securing the Industrial Internet of Things in the Utilities Sector

Reading Time: 4 minutes While the industrial internet of things has clear benefits, IIoT environments also have the potential to expose high-value assets or services to a larger attack surface.

The post Securing the Industrial Internet of Things in the Utilities Sector appeared first on Security Intelligence.

Continue reading Securing the Industrial Internet of Things in the Utilities Sector

5G Technology Is Coming, But Is It Already Filled With Security Flaws?

Reading Time: 3 minutes There is a lot to be excited about with 5G technology, but it will also open more doors for threat actors to get into networks, making it more difficult to effectively protect endpoints and data.

The post 5G Technology Is Coming, But Is It Already Filled With Security Flaws? appeared first on Security Intelligence.

Continue reading 5G Technology Is Coming, But Is It Already Filled With Security Flaws?

Top Five Security Focus Areas for Mainframes

Reading Time: 5 minutes Given trends like data center consolidation, hybrid cloud models and new designs that allow mainframes to operate in traditional environments, what better time to reevaluate your mainframe security?

The post Top Five Security Focus Areas for Mainframes appeared first on Security Intelligence.

Continue reading Top Five Security Focus Areas for Mainframes