Automotive cybersecurity for connected cars

While addressing cybersecurity threats has become common practice for consumer devices such as personal computers and smart phones, cybersecurity for connected vehicles with rapidly evolving technologies and more complex attack surfaces is still going through the process of being studied and fully understood.

Read more

Securing the IoT threat vector

Organisations today know that they need to have a cybersecurity strategy in place to protect their intellectual property (IP) and sensitive data from getting into the hands of cybercriminals.

Read more

Skyhigh Networks reveals sophisticated cyber attack campaign on enterprise Office 365 users

Skyhigh Networks, the provider of Cloud Access Security Broker (CASB) platform, announced it has detected and remediated one of the first examples of an operationalised cloud-to-cloud threat in the enterprise. Attackers used popular cloud service platforms to conduct a persistent attack to log into corporate Office 365 accounts.

Read more

A random look at IoT security

The traditional concept of a corporate security perimeter has been fading slowly for at least a decade. The cloud put it on life support and the IoT will kill it off for good. The IoT presents a whole new set of challenges and on a completely different scale.

Read more

Telcos: when it comes to IoT security, prevention is always better than cure

Smart devices have arguably made consumers’ lives easier, and as they become more affordable, more of us are investing in the IoT. However, all too often, these smart devices are being manufactured with affordability in mind and security as an afterthought.

Read more

We could snuff out DDoS attack by fighting fire with Multefire

Don’t go onto the IoT right now, there’s some demons out there.

Read more

A ‘common security model’ against typical hazards in the IoT

Up to now, individuals have generally been using a dedicated computer for work; now, however, the Internet of Things (IoT), with billions of networked devices that are for the most part not monitored by humans, presents enormous inherent security risks.

Read more

OEMs fight cloning and data theft with smart encryption from MerlinM2M

Austin, Texas, USA. March 5, 2012 — Encryption security software company, MerlinCryption LLC, is helping OEM developers to cut the risk of cloning, software compromise, physical machine compromise, and man-in-the-middle attacks with a new encryption solution platform specifically designed for the embedded device and M2M market.

Read more