Application Security February 8, 2017 A Primer on IoT Security Risks 4 min read - IoT security risks include physical, network, software and encryption attacks that target the sensor, network and application layers of IoT systems.
Intelligence & Analytics February 7, 2017 Voice Privacy in the Enterprise: Are You Listening? 3 min read - The EWF's Voice Privacy Alliance aims to help consumers enjoy the benefits and convenience of voice-enabled devices and avoid the security pitfalls.
February 6, 2017 Beyond Virtual: Vulnerability Testing Tools Now Hack Hardware 2 min read - A new Metasploit hardware bridge enables IT professionals to hack their own hardware, reducing the complexity of device-based vulnerability testing.
Risk Management February 3, 2017 Highlights From the World Economic Forum’s ‘Global Risks Report 2017’ 2 min read - The lack of concern for cyber issues reflected in the World Economic Forum's "Global Risks Report 2017" speaks to a worldwide lack of security awareness.
Endpoint February 2, 2017 Is IoT Security an Oxymoron? 3 min read - As the Internet of Things continues to expand, IT leaders must prepare accordingly or find themselves vulnerable to countless IoT security threats.
January 26, 2017 CES 2017: Cultivating a New IoT Cybersecurity Crop 2 min read - IoT security products generated the biggest buzz at CES 2017, laying the groundwork for industrywide standards and more robust enterprise applications.
January 25, 2017 Mozilla Issues First ‘Internet Health Report’ 2 min read - The Mozilla Foundation issued its first "Internet Health Report" to generate public awareness about current and oncoming cyberthreats.
Application Security January 18, 2017 10 Key Findings From the Ponemon Institute’s Mobile & IoT Application Security Testing Study 4 min read - According to a recent Ponemon study, many organizations fail to conduct application security testing despite concerns about potential data breaches.
CISO January 16, 2017 The Most Unnerving Security Trends to Prepare for in 2017 2 min read - To stay ahead of increasingly sophisticated cyberthreats, CISOs and IT professionals must pay attention to the top security trends emerging in 2017.
Application Security January 11, 2017 Don’t Let Remote Management Software Contribute to Building Botnets 4 min read - IT leaders must be vigilant when using remote management software. Attackers can exploit these tools to infect devices with malware and build botnets.