What cyber trust mark means for IoT data protection

The internet of things (IoT) has a market value of $662 billion (€605.73 billion) today. By 2030, it is expected to grow to $3.35 trillion (€3.07 trillion). The seamless, connected experience that IoT devices offer is clearly attractive to consumers, but it also presents an increasingly attractive market that bad actors are only too willing

Read more

Prioritising security as electric vehicle charging ramps up

As governments around the world instigate and progress sustainable transport policies and initiatives, the need for more electric vehicle (EV) charge points grows. The IoT underpins this relatively new infrastructure by enabling the exchange of operational and other data. To secure and protect this data and charging assets, charge point operators (CPOs) must design their

Read more

UK cybersecurity companies combine forces to champion next-level threat intelligence

Portsmouth, UK. 22 February 2022 – Two UK cybersecurity companies Searchlight Security, the provider of specialist deep and dark web monitoring products, and Omniscope, the digital threat intelligence and investigations business, have announced a partnership that brings next-level threat intelligence to enterprise customers and law enforcement agencies alike.

Read more

It’s confirmed: IoT is under cyberattack

A WEEK IN IoT — Hosting a lively webinar debate yesterday on LTE-M with Aeris and IoT Analytics, I couldn’t help noticing, says Jeremy Cowan, editorial director of IoT Now, how often the audience asked questions on how to secure the Internet of Things. It bore out the results of a new five-country survey.

Read more

The key problems facing security operations centres today and how AI will help to solve them

The security industry is facing a huge problem and one which, until recently, looked intractable. There are just not enough cyber security operatives in the world’s Security Operations Centres (SOCs)

Read more

Instead of sending data to the cloud, why not send the cloud to the edge?

In the IoT era, companies increasingly require critical decisions to be made in fractions of seconds. Yet in the most time-sensitive situations, says Adi Hirschtein, director of product at Iguazio, the latency involved in sending their data to a centralised cloud and back poses significant hurdles to efficiency and economy.

Read more

CEBIT puts the spotlight on IT security and data security

CEBIT‘s approach resonates with current industry thinking. For example, in its most recent report on the state of IT security in Germany, the German Federal Office for Information Security (BSI) described data security as “the cornerstone of successful digitisation”.

Read more

Gigamon introduces new integrations with Splunk and Phantom, bringing its Defender Lifecycle Model to life

Gigamon Inc., the provider in visibility solutions, announced new integrations with both Splunk and Phantom aimed at accelerating incident response, reducing the time to threat detection and automating threat mitigation. The Gigamon IPFIX Metadata Application for Splunk,

Read more

Scared about supply chain cybersecurity? 5 reasons you aren’t scared enough- Part 2

We saw the 1st reason of supply chain cybersecurity in the Part 1 yesterday. Now we see the remaining reasons today. In today’s world, “common criminals, organised crime rings, and nation-states leverage sophisticated techniques to launch attacks that are highly targeted and very difficult to detect,”

Read more

Barr Group’s 2017 Embedded Systems Safety & Security Survey reveals vulnerabilities in the IoT

Barr Group, The Embedded Systems Experts®, has released preliminary results from its 2017 Embedded Systems Safety & Security Survey highlighting concerning statistics regarding design trends for Internet of Things (IoT) devices.

Read more