Are Companies Ready for the Risks of IoT?

Are Companies Ready for the Risks of IoT?

by Business Insights , on 04.07.2020

The Internet of Things (IoT) and Industrial IoT (IIoT) are beginning to see some real momentum, particularly in industries such as manufacturing, healthcare, and retail. More and more devices, equipment, vehicles, buildings, and other objects are being equipped with sensors and connected, enabling the sharing of data that provides useful insights for businesses. read more

Why Vulnerable IoT Is a Double-Sided Problem for ISPs and Their Customers

Why Vulnerable IoT Is a Double-Sided Problem for ISPs and Their Customers

by Silviu Stahie, from Business Insights , on 03.07.2020

A scan of the Japanese Internet infrastructure showed how many devices could be compromised with common user names and passwords, and ISPs helped the authorities make that determination. But ISPs also seemed to lack the tools to make those determinations by themselves, in a way that secures their networks and customers at the same time. read more

10 Stats About SOC Performance, Practices, and Analyst Attitudes in 2020

10 Stats About SOC Performance, Practices, and Analyst Attitudes in 2020

by Business Insights , on 02.07.2020

Recent studies show that the modern SOC has evolved to become the lynchpin for most enterprise security strategies. Organizations spend a significant chunk of their security budget on SOC operations and many depend upon the SOC to help them detect and hunt for threats, respond to incidents, and maintain visibility into the organization's cyber risk posture. However, SOC effectiveness still varies greatly from organization to organization. read more

Remote Workers Encounter 8 Risky URLs per Day, New Research Shows

Remote Workers Encounter 8 Risky URLs per Day, New Research Shows

by Filip Truta, from Business Insights , on 02.07.2020

Given enough time, employees – especially those working remotely – will click on a link to a potentially dangerous website. But how much time? According to recent data, less than an hour. read more

DDoS Attacks Increase Almost 300% in Just One Year, Study Shows

DDoS Attacks Increase Almost 300% in Just One Year, Study Shows

by Silviu Stahie, from Business Insights , on 01.07.2020

DDoS attacks are on the rise at a time of the year that's usually a lot less uneventful, according to a report from Nexusguard that reveals a 278% increase in DDoS attacks compared to Q1 2019. read more

Business Email Compromise (BEC) Attacks Jump 200 Percent from April to May

Business Email Compromise (BEC) Attacks Jump 200 Percent from April to May

by Filip Truta, from Business Insights , on 01.07.2020

New data shows a sharp increase in monthly business email compromise (BEC) attacks focused on invoice or payment fraud. read more

Untrained and Malicious Users Lead Concerns among IT Professionals in the UK

Untrained and Malicious Users Lead Concerns among IT Professionals in the UK

by Alina Bizga, from Business Insights , on 30.06.2020

A new report published by KnowBe4 delves into the top security challenges and issues that IT professionals and UK-based organizations face, including attack types, security initiatives and organizational limits. read more

Smart Assistants Are Falsely Triggered All the Time

Smart Assistants Are Falsely Triggered All the Time

by Silviu STAHIE, from IoT Security Insights , on 03.07.2020

Voice assistants should only listen to their owners and ignore the rest, but new research shows that they can respond to false triggers much more than we imagine, and it’s usually the result of forgiving programming. Most people can point to situations when their phone or smart assistant woke up, seemingly triggered by someone talking ... The post Smart Assistants Are Falsely Triggered All the Time appeared first on Bitdefender. read more

CISA and FBI Issue Advisory on Dealing with Tor Malicious Internet Traffic

CISA and FBI Issue Advisory on Dealing with Tor Malicious Internet Traffic

by Silviu Stahie, from Business Insights , on 03.07.2020

The Cybersecurity Security and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have issued an advisory for companies regarding the detection and mitigation of malicious traffic coming from Tor (The Onion Router.) read more

Enforcing IoT Security Up the Hardware Supply Chain

Enforcing IoT Security Up the Hardware Supply Chain

by Silviu STAHIE, from IoT Security Insights , on 02.07.2020

The IoT manufacturing chain is highly fragmented, with some companies enforcing security measures and others that only care about bringing their products to the market as soon as possible. An initiative from The Atlantic Council advises how the United States could leverage its position to force companies to adopt a more cohesive security strategy. The ... The post Enforcing IoT Security Up the Hardware Supply Chain appeared first on Bitdefender. read more

Next >>