Remove InfoSec Remove Internet Remove IoT Remove Risk
article thumbnail

Daniel Miessler on My Writings about IoT Security

Schneier on Security

Daniel Miessler criticizes my writings about IoT security: I know it's super cool to scream about how IoT is insecure, how it's dumb to hook up everyday objects like houses and cars and locks to the internet, how bad things can get, and I know it's fun to be invited to talk about how everything is doom and gloom.

IoT 124
article thumbnail

ISO/IEC 27400 IoT security and privacy standard published

Notice Bored

To celebrate the publication of ISO/IEC 27400:2022 today, we have slashed the price for our IoT security policy templates to just $10 each through SecAware.com. IoT policy is the first of the basic security controls shown on the 'risk-control spectrum' diagram above, and is Control-01 in the new standard.

IoT 94
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hackers Could Cause ‘Fake Earthquakes’ by Exploiting Vulnerable Seismic Equipment, Researchers Warn

Hot for Security

Seismic monitoring equipment is vulnerable to common cybersecurity threats like those faced by IoT devices, a new research paper warns. “It seems that most seismologists and network operators are unaware of the vulnerabilities of their IoT devices, and the potential risk that their monitoring networks are exposed to,” said Samios.

IoT 128
article thumbnail

New certification program trains cyber pros in cloud, IoT and other emerging tech

SC Magazine

A visitor looks at an IoT & 5G motherboard at the booth of STMicroelectronics during Electronica China 2021 at Shanghai New International Expo Centre on April 14, 2021 in Shanghai, China. On one hand, you will reduce cost and transfer some of your risk to a third party. Photo by VCG/VCG via Getty Images).

IoT 91
article thumbnail

Domotics - a can-o-worms

Notice Bored

This morning, I’ve been browsing and thinking about ISO/IEC 27403 , a draft ISO27k standard on the infosec and privacy aspects of “domotics” i.e. IoT things at home. IoT things are generally just black-boxes. Dynamics and diversity: people, devices and services plus the associated challenges and risks, are varied and changeable.

IoT 63
article thumbnail

The 7 Biggest Cybersecurity Scoops from February 2015

SiteLock

Internet Explorer Vulnerability Discovered. Earlier this month, a security researcher discovered a major security flaw in Microsoft’s Internet Explorer browser. 2015 Cyber Security Risks. TechRadar recently posted an article covering the top seven cyber security risks that businesses should be aware of for 2015.

article thumbnail

Inside the Complex Universe of Cybersecurity

SecureWorld News

Working as CISO, DeSouza's areas of expertise include strategic planning, risk management, identity management, cloud computing, and privacy. While it fosters innovation, automation, and productivity, it simultaneously introduces significant cybersecurity and privacy risks. With the maturation of Zero Trust, propelled by the U.S.