Cybersecurity in business is often overlooked, underfunded or simply not given enough thought. Though recent research by Avast Business found that 96% of SMBs are concerned about malware and ransomware, the ‘it won’t happen to us’ attitude is still just as prevalent as the underlying fear of being hacked.
Digital identity and mobile credentials provider Intercede announced an integration with MobileIron, the security backbone for the multi-cloud enterprise, on a new derived credentials solution to secure and protect U.S. Federal Government employees and their data.
Skyhigh Networks, the provider of Cloud Access Security Broker (CASB) platform, announced it has detected and remediated one of the first examples of an operationalised cloud-to-cloud threat in the enterprise. Attackers used popular cloud service platforms to conduct a persistent attack to log into corporate Office 365 accounts.
Successful IoT projects are security driven and focused on business needs, says Ben Boswell, UK & Ireland director of World Wide Technology.
In October 2016 the world received a harsh wake-up call about the importance of IoT security, says Shane Buckley, CEO of Xirrus.
In the last year, we’ve all heard of the Mirai malware, but did you know that Mirai is Japanese for ‘the future’? And that’s what I believe we are seeing: The future of cyber-attacks.
Up to now, individuals have generally been using a dedicated computer for work; now, however, the Internet of Things (IoT), with billions of networked devices that are for the most part not monitored by humans, presents enormous inherent security risks.
The infamous Mirai malware is now capable of targeting Windows systems, according to researchers at an antivirus firm. The original version of the malware was discovered in August 2016 and was used by cybercriminals to create botnets of infected Internet of Things (IoT) devices.
All these Mirai BotNet stories can’t be helping the IoT industry can they? Still, on the basis that all publicity is good publicity, perhaps some good will come out of the recent network hijackings.
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.