The Cybercrime Landscape Is Evolving — Will Your Mobile Threat Defense Strategy Keep Up?

As the workforce becomes increasingly mobile, organizations must adapt their security strategies to account for the enlarged threat surface. While mobility undeniably helps organizations boost productivity, it also creates considerable weaknesses in the IT environment. How can companies strike a balance between giving employees the 24/7 access they need to perform their jobs and protecting…

Getting Started with IoT Security in Healthcare

There’s a hazard that comes with introducing any new element into patient care whether it’s a new drug or a connected device. These four steps will help keep patients safe. It’s estimated that by 2025, more than 30 percent of all Internet of Things (IoT) devices will be dedicated to the realm of healthcare – more than…

Why Smart Devices Need Even Smarter Security

The introduction of a new generation of connected, intelligent devices into the workplace has helped businesses become more productive, serve customers more efficiently and expand into new markets. But as more smart devices join the burgeoning Internet of Things (IoT), the transition has scrambled the historical notion of the corporate endpoint. We’ve moved beyond the…

Putting IoT Security Front and Center

The Internet of Things (IoT) is not just hype anymore. It is taking off at an enormous rate, and the predictions of 20 billion connected devices by 2020now sound entirely likely. But as it takes off, so do IoT security challenges for both enterprises and consumers. Obstacles range from software updating issues to employee education…

Zones of Trust: A New Way of Thinking about IoT Security

Recent attacks have focused attention on how to safely add “things”to enterprise networks, a topic that straddles IT and physical security. A zones-of-trust approach may be the answer. Last year, when attackers hacked into more than 25,000 Internet of Things (IoT) closed-circuit TV devices and used them in a denial-of-service botnet attack, this question was…

The Role of the Network in Preventing Dyn 2.0

Much has been said about the DDoS attacks on Dyn and the subsequent security issues surrounding IoT devices.  In late 2016, hackers exploited hundreds of thousands of IoT devices, such as security cameras and DVRs, to cause massive internet outages over a prolonged period of time. While this attack has resulted in an uproar of…