NIST panel debates who should own IoT security: vendors or users. The issue is especially important when it comes to protecting medical devices. Read More ▶ | | | Its machine speed allows it to scale, while the human penetration testers ensure complete accuracy. Read More ▶ | | Abandoned domain names are low-hanging fruit for attackers, who can use them to access sensitive email or customer data. Read More ▶ | | | A thorough end-user education program is a necessary weapon in the battle to protect your perimeter. These 10 topics are the baseline of what to include in an awareness training program. Read More ▶ | | Smart buildings are giant IoT devices begging to get hacked. A new report offers concrete advice on how to mitigate the risk to building automation and control systems (BACS). Read More ▶ | | A new report suggests many organizations are failing in the basic cyber hygiene efforts and leaving themselves exposed to hackers. Read More ▶ | | Short and crackable vs. long, complex and prone to reuse? The password debate rages on. Read More ▶ | | Editor's Picks | | | Get Security Smart From the editors of CSO, Security Smart is a quarterly security awareness newsletter ready for distribution in your organization. Subscribe now and arm your employees with the information they need to be more secure at home and at work. Learn more. | | | | |
0 comments:
Post a Comment