article thumbnail

Podcast: Can we fix IoT security?

Webroot

For others, home networks are simply hosting more devices as smart doorbells, thermostats and refrigerators now connect to the internet. Security experts warn that while the internet of things (IoT) isn’t inherently a bad thing, it does present concerns that must be considered. The post Podcast: Can we fix IoT security?

IoT 91
article thumbnail

MY TAKE: ‘Network Detection and Response’ emerges as an Internet of Things security stopgap

The Last Watchdog

Related: The promise, pitfalls of IoT Companies have commenced the dispersal of IoT systems far and wide. Data collected by IoT devices will increasingly get ingested into cloud-centric networks where it will get crunched by virtual servers. Very clearly, something more is needed.

Internet 195
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hacking Wi-Fi networks by exploiting a flaw in Philips Smart Light Bulbs

Security Affairs

Check Point experts discovered a high-severity flaw in Philips Hue Smart Light Bulbs that can be exploited to gain entry into a targeted WiFi network. The malware could move laterally and infect other systems in the target network. ZigBee is an IEEE 802.15.4-based ” reads the report published by CheckPoint.”Our

Hacking 119
article thumbnail

Healthcare – Patient or Perpetrator? – The Cybercriminals Within

Security Affairs

With copious amounts of data collected by healthcare facilities, cybercriminals often target such entities. Moreover, the healthcare industry collects unique data, known as Protected Health Information (PHI), which is extremely valuable. The healthcare industry might be known for the work it does to treat patients.

article thumbnail

34 Most Common Types of Network Security Protections

eSecurity Planet

Whether you’re operating a global enterprise network or a small family business, your network’s security needs to be optimized with tools, teams, and processes to protect customer data and valuable business assets. Also read: What is Network Security?

article thumbnail

Vulnerability Management Automation: A Mandate, Not A Choice

CyberSecurity Insiders

Vulnerability management is about detecting and securing IT and customer-facing systems throughout an organization. As companies continually expand to the cloud, remote endpoints, IoT, and virtual machines, visibility is difficult for human eyes. Applying patches and updates quickly is essential to keep networks secure.

article thumbnail

Reinventing Asset Management for Cybersecurity Professionals

IT Security Guru

By combining agent-based and agentless data collection, active scanning to track known assets, passive scanning to identify unknown assets, and APIs for automation, the Qualys Cloud Platform provides comprehensive asset discovery across your entire infrastructure, including on-premises, cloud, container, OT, and IoT.