It’s confirmed: IoT is under cyberattack

A WEEK IN IoT — Hosting a lively webinar debate yesterday on LTE-M with Aeris and IoT Analytics, I couldn’t help noticing, says Jeremy Cowan, editorial director of IoT Now, how often the audience asked questions on how to secure the Internet of Things. It bore out the results of a new five-country survey.

Read more

The key problems facing security operations centres today and how AI will help to solve them

The security industry is facing a huge problem and one which, until recently, looked intractable. There are just not enough cyber security operatives in the world’s Security Operations Centres (SOCs)

Read more

Instead of sending data to the cloud, why not send the cloud to the edge?

In the IoT era, companies increasingly require critical decisions to be made in fractions of seconds. Yet in the most time-sensitive situations, says Adi Hirschtein, director of product at Iguazio, the latency involved in sending their data to a centralised cloud and back poses significant hurdles to efficiency and economy.

Read more

CEBIT puts the spotlight on IT security and data security

CEBIT‘s approach resonates with current industry thinking. For example, in its most recent report on the state of IT security in Germany, the German Federal Office for Information Security (BSI) described data security as “the cornerstone of successful digitisation”.

Read more

Gigamon introduces new integrations with Splunk and Phantom, bringing its Defender Lifecycle Model to life

Gigamon Inc., the provider in visibility solutions, announced new integrations with both Splunk and Phantom aimed at accelerating incident response, reducing the time to threat detection and automating threat mitigation. The Gigamon IPFIX Metadata Application for Splunk,

Read more

Scared about supply chain cybersecurity? 5 reasons you aren’t scared enough- Part 2

We saw the 1st reason of supply chain cybersecurity in the Part 1 yesterday. Now we see the remaining reasons today. In today’s world, “common criminals, organised crime rings, and nation-states leverage sophisticated techniques to launch attacks that are highly targeted and very difficult to detect,”

Read more

Barr Group’s 2017 Embedded Systems Safety & Security Survey reveals vulnerabilities in the IoT

Barr Group, The Embedded Systems Experts®, has released preliminary results from its 2017 Embedded Systems Safety & Security Survey highlighting concerning statistics regarding design trends for Internet of Things (IoT) devices.

Read more