IDG Contributor Network: Fasten your seatbelt in the IoT cybersecurity race

Using very old and simple techniques such as brute force attacks, cybercriminals are gaining control over a population of insecure internet of things (IoT) devices with arsenals of malware. Brian Krebs’ website was recently targeted in the largest ever distributed denial-of-service (DDoS) attack. The source code that powered the IoT botnet responsible for the attack…

7 Imminent IoT Threats

Recent distributed denial-of-service (DDoS) attacks involving the use of thousands of compromised digital video recorders and IP cameras have highlighted the looming security threat posed by the Internet of Things (IoT). Analyst firm Juniper Research estimates that between now and the end of 2020, the number of “things” connected to the Internet will grow from…

From Chasing Alerts to Hunting Threats: What Makes an Effective SOC is Evolving

Whether you call it a SOC, a CSOC, a Cyber Defense Center, or something else, security operation centers have the same fundamental mission – to help organizations detect, analyze, respond to, report on, and prevent cyber security incidents. But what it takes to do that effectively has changed in this ever-evolving threat landscape, putting an…

Mainframe Security: An Easy and Intuitive Access Security Model

Mainframe security is simple to understand and extremely intuitive to apply. Some might find it hard to believe that the mainframe security model can be easily integrated with other platforms and applications. As everyone in the IT industry knows, a system’s security level depends strictly on the possibility of attacks from unknown and unplanned access….

Why you need to develop an immersive security strategy

Security solutions today are inadequate in part because they do not provide a truly effective experience for consuming security data and analyzing and responding to threats. In this evolving threat landscape, businesses will need to utilize intuitiveness and situational awareness to enable security professionals to really “experience” the data and become more efficient and strategic….

Critical cybersecurity priorities for the next US president

While the US presidential campaign has occasionally focused on cyber security, the topic demands more urgent attention from the individual elected as the 45th President of the United States. ISACA recommends that cyber security be a significant component of the next president’s 100-day agenda, especially given its overlap with geopolitical and economic issues. Bolstering the…

Microsoft Researchers Release Anti-Reconnaissance Tool

Microsoft researchers have released a new tool designed to help security teams protect corporate networks by making it more difficult for attackers to conduct reconnaissance. The tool, dubbed “NetCease,” was developed by Itai Grady and Tal Be’ery of the Microsoft Advanced Threat Analytics (ATA) research team. NetCease has been made available on Microsoft’s TechNet Gallery,…

IoT Default Passwords: Just Don’t Do It

Earlier this month, an underground forum released the code for the Mirai malware, which lets attackers hijack the thousands (and counting) of Internet of Things devices that are used to carry out distributed denial-of-service attacks. Panic ensued. Of course it did. This hack means that everyone can now view the code that allowed someone using…