Remove sponsor
article thumbnail

5 IoT Security Predictions for 2019

Security Affairs

2018 was the year of the Internet of Things (IoT), massive attacks and various botnets hit smart devices, These are 5 IoT Security Predictions for 2019. IoT Attacks in 2018. Do the increased attacks mean the industry is becoming accustomed to IoT cyber attacks? Three IoT Attack Avenues for 2019.

IoT 87
article thumbnail

Integrating Perimeter and Internal Defenses: 5 Facts That May or May Not Surprise

Cisco Security

IDC recently had the opportunity to talk to CISOs regarding the integration of Cisco Secure Workload and Secure Firewall. Rather, digital transformation can force us to wrap devices or application like workloads and IoT devices in zero-trust policies elegantly or inelegantly; digital transformation does not care.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FortiNAC: Network Access Control (NAC) Product Review

eSecurity Planet

Although best known for their industry-leading firewall technology, Fortinet harnesses their knowledge of network protection to create a powerful network access control (NAC) solution. Founded in 2000 , Sunnyvale, California headquartered Fortinet’s flagship FortiGate provides enterprise-grade firewall solutions.

IoT 98
article thumbnail

Episode 220: Unpacking The Kaseya Attack And Securing Device Identities on the IoT

The Security Ledger

In this episode of the podcast, sponsored by Trusted Computing Group we dig deep on this week’s ransomware attack on the Kaseya IT management software with Adam Meyers of CrowdStrike and Frank Breedijk of the Dutch Institute of Vulnerability Disclosure. Spotlight Podcast: Two Decades On, Trusted Computing Group tackles IoT Insecurity.

IoT 52
article thumbnail

Russia-linked Cyclops Blink botnet targeting ASUS routers

Security Affairs

According to WatchGuard , Cyclops Blink may have affected roughly 1% of all active WatchGuard firewall appliances. Sandworm (aka BlackEnergy and TeleBots) has been active since 2000, it operates under the control of Unit 74455 of the Russian GRU’s Main Center for Special Technologies (GTsST). India, Italy, Canada, and Russia.

IoT 93
article thumbnail

Episode 168: Application Security Debt is growing. Also: Web App Security in the Age of IoT

The Security Ledger

In this week’s episode of the podcast (#168), sponsored by Signal Sciences, Chris Eng of Veracode joins us to talk about the 10th annual State of Software Security Report and the problem of application security debt. Securing Web Applications in the Age of the IoT. Read the whole entry. » Also: making Passwords work.

IoT 40
article thumbnail

Episode 168: Application Security Debt is growing and Securing Web Apps in the Age of IoT

The Security Ledger

In this week’s episode of the podcast (#168), sponsored by Signal Sciences, Chris Eng of Veracode joins us to talk about the 10th annual State of Software Security Report and the problem of application security debt. Securing Web Applications in the Age of the IoT. Read the whole entry. » Also: making Passwords work.

IoT 40