Post Tagged with: "Security"

Rise of Machines Report Highlights Connected Device Security Trends During COVID

Rise of Machines Report Highlights Connected Device Security Trends During COVID

Ordr, an expert in agentless connected device security, just released its annual report on the state of connected devices, titled “Rise of the Machines 2021: State of Connected devices — IT, IoT, IoMT and OT.” It addresses pandemic-related cybersecurity challenges.

IoT -Security: Critical Vulnerability Affecting Millions of Devices

IoT -Security: Critical Vulnerability Affecting Millions of Devices

In coordination with the Cybersecurity and Infrastructure Security Agency (CISA), Mandiant disclosed a critical risk vulnerability in IoT – security that affects millions of devices that use the ThroughTek “Kalay”-network.

High noon in the cloud: Gaia-X and the Lawful Overseas Use of Data

High noon in the cloud: Gaia-X and the Lawful Overseas Use of Data

In certain circumstances under the Cloud (Clarifying Lawful Overseas Use of Data) Act, the US courts can demand the surrender of any personal data from American cloud providers.

ICS Vulnerabilities: No Lockdown for ICS Hackers

ICS Vulnerabilities: No Lockdown for ICS Hackers

Industrial control system vulnerabilities are increasing – at the same time, awareness of the security of industrial networks is growing. ■ by Chen Fradkin Few of us will have fond memories of 2020, a transformative year that forced businesses worldwide to rethink and reprioritize remote workforces, their impact on productivity […]

IoT Security: Identity of things

IoT Security: Identity of things

Every device, app, service, and interface in IoT needs its own identity, which operators can use to track and analyze activity. This is not only used to identify problems but also to protect the systems from attacks, attempted fraud, and espionage.Io

Standardization Versus Risk Management: How Much Cybersecurity Is Enough?

Standardization Versus Risk Management: How Much Cybersecurity Is Enough?

There’s no doubt that cybersecurity is a complex topic to legislate. Given how fast-moving security’s components are, legislation is often too slow and cumbersome. Antonio Ramos, CEO of Leet Security, a cybersecurity ratings agency based in Madrid and member of the Stakeholder Cybersecurity Certification Group (SCCG), says that recent trends […]

EU Radio Equipment Directive (RED): How Insecure is Consumer IoT?

EU Radio Equipment Directive (RED): How Insecure is Consumer IoT?

A principal factor that will shape the views of the Radio Equipment Directive (RED) delegated act relates to how significant groups or individuals view the scale of the cybersecurity problem in consumer devices.

The EU Cybersecurity Act: A Price worth Paying

The EU Cybersecurity Act: A Price worth Paying

A host of new rules should improve cybersecurity, but some industry groups warn these will add to costs and administrative burdens and may even spawn confusion and ambiguity.

Trustworthy Source: Traficom in Finland has launched a cybersecurity label that guarantees labeled devices have basic information security features built in. The label can be awarded to networking smart devices if the devices meet certain certification criteria. Traficom aims to raise consumer awareness of information security and the safe use of connected devices.

Cybersecurity Labeling in Finland: A Sure Sign of Safety

One approach to cybersecurity for connected consumer devices is to introduce a Cybersecurity labeling scheme to help buyers make educated choices and increase market pressure on manufacturers to meet higher standards.

Nokia Report Warns of Rising Cyberattacks on IoT-Devices

Nokia Report Warns of Rising Cyberattacks on IoT-Devices

Nokia just released it’s new Threat Intelligence Report. Due to it, cyberattacks on IoT devices continue to rise at an alarming rate due to poor security protections and cybercriminals use of automated tools to exploit these vulnerabilities.