Security

Networkworld

Securing the IoT has become business-critical

The IoT era has arrived.Here’s some proof: 83% of organizations say the Internet of Things (IoT) is important to business today, and 92% say it will be in two years.That’s according to a recent DigiCert survey conducted by ReRez Research of 700 organizations in five countries to better understand the IoT and IoT security.Anecdotally, I always find that markets have matured when it’s no longer an unusual thing. For example, a few years ago, it was hard to find IoT deployments that were outside of the traditional machine-to-machine industries such as manufacturing and oil and gas. Today, connected things are everywhere. Case in point: I recently interviewed the IT director at an entertainment venue and he walked me through all the connected things without ever saying “IoT.” The organization was connecting more things to improve customer experience, and it was treated as no big deal.To read this article in full, please click here READ MORE HERE…

Read More
Networkworld

The perils of using voice commands with IoT machines

Earlier this week, German carmaker Volkswagen announced an upgrade to its VW Car-Net mobile app that lets iPhone users control their Golfs and Jettas using Siri commands. Specifically, iPhone users on iOS 12 can say, “Hey, Siri” to lock and unlock the car, check estimated range remain, flash the warning lights, and toot the horn. You can also add Shortcuts to Siri with personalized phrases to start/stop charging, defrosting, and climate controls; set the temperature; and even ask, “Where is my car?”Woo-hoo, pretty exciting right? Not in most cases, actually, but the announcement got me thinking about the limits and perils of voice commands in automotive applications.To read this article in full, please click here READ MORE HERE…

Read More
TrendMicro

The Importance of Employee Cybersecurity Training: Top Strategies and Best Practices

For those responsible for overseeing the data protection and cybersecurity of an organization, it’s a familiar storyline: “Employee opens email attachment and infects business with ransomware.” Headlines to this effect are nothing new. Even the most advanced security solutions can’t completely guard against the sophisticated approaches hackers leverage to target individual users. All it takes is for…
The post The Importance of Employee Cybersecurity Training: Top Strategies and Best Practices appeared first on . Read More HERE…

Read More
Networkworld

GPUs are vulnerable to side-channel attacks

Computer scientists at the University of California at Riverside have found that GPUs are vulnerable to side-channel attacks, the same kinds of exploits that have impacted Intel and AMD CPUs.Two professors and two students, one a computer science doctoral student and a post-doctoral researcher, reverse-engineered a Nvidia GPU to demonstrate three attacks on both graphics and computational stacks, as well as across them. The researchers believe these are the first reported side-channel attacks on GPUs.[ Read also: What are the Meltdown and Spectre exploits? | Get regularly scheduled insights: Sign up for Network World newsletters ]
A side-channel attack is one where the attacker uses how a technology operates, in this case a GPU, rather than a bug or flaw in the code. It takes advantage of how the processor is designed and exploits it in ways the designers hadn’t thought of.To read this article in full, please click here READ MORE HERE…

Read More
Networkworld

Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

iDrive has activated a significant discount on their Remote access software RemotePC in these days leading into Black Friday. RemotePC by iDrive is a full-featured remote access solution that lets you connect to your work, home or office computer securely from anywhere, and from any iOS or Android device. Right now, their 50 computer package is 90% off or just $6.95 for your 1st year. If you’ve been thinking about remote access solutions, now is a good time to consider RemotePC. Learn more about it here.To read this article in full, please click here READ MORE HERE…

Read More
TrendMicro

Research Drives Protection

The threat landscape has changed often in the 22 years I’ve been working at Trend Micro and it will continue to change for many more years. We in cybersecurity are constantly at battle with hackers and threat actors who look to infect our customers using the many tactics available to them. Our job is to…
The post Research Drives Protection appeared first on . Read More HERE…

Read More
TrendMicro

Cyber Workforce DevOps: A Way to Close the Cyber Skills Gap

I personally had a great week last week. Trend Micro was very fortunate to participate in and sponsor the National Institute of Standards and Technology (NIST), National Initiative for Cybersecurity Education (NICE) 2018 Conference and Expo and the IBM Cyber Day 4 Girls at Florida International University (FIU). I truly tip my hat to FIU as…
The post Cyber Workforce DevOps: A Way to Close the Cyber Skills Gap appeared first on . Read More HERE…

Read More
TrendMicro

Four Ways Layered Security Will Improve Your Detection and Response

It’s widely understood by cybersecurity professionals today that it’s no longer a case of if your organization gets attacked online but when. Trend Micro blocked more than 20.4 billion threats in the first half of 2018 alone, and the ready availability of “as-a-service” toolkits will continue to make cybercrime a hugely attractive and profitable venture….
The post Four Ways Layered Security Will Improve Your Detection and Response appeared first on . Read More HERE…

Read More
Networkworld

What is Transport Layer Security (TLS)?

Despite the goal of keeping Web communications private, flaws in the design and implementation of Transport Layer Security have led to breaches, but the latest version – TLS 1.3 – is an overhaul that strengthens and streamlines the crypto protocol.What is TLS?
TLS is a cryptographic protocol that provides end-to-end communications security over networks and is widely used for internet communications and online transactions. It is an IETF standard intended to prevent eavesdropping, tampering and message forgery. Common applications that employ TLS include Web browsers, instant messaging, e-mail and voice over IP.To read this article in full, please click here READ MORE HERE…

Read More
TrendMicro

This Week in Security News: Fake Apps & Malicious Bots

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn how the adoption of mobile banking services has grown as an opportunity for scammers with fake banking apps. Also, see how Trickbot steals access from several…
The post This Week in Security News: Fake Apps & Malicious Bots appeared first on . Read More HERE…

Read More