Information Security

New generations of Internet connected products are often insecure and pose safety and privacy risks to consumers. What will it take to make consumer electronics safe? We ask experts from the firm Senrio for their thoughts. (Image courtesy of CTA.)

Podcast: Can We Make CES Secure Again?

In-brief: With CES going on in Las Vegas, The Security Ledger sat down with three experts from the firm Senrio to talk about the new generation of connected consumer electronics. How vulnerable are they to attack? What is the best way to address security and privacy concerns in them? 

Tenable's survey of information security pros found concerns that advancements like application containerization and DevOps are complicating the jobs of information security pros, and reducing effectiveness. (Image courtesy of Tenable Network Security.)

Report: DevOps, Containerization, challenge Security Pros

In-brief: Despite the benefits of the DevOps paradigm and application virtualization in software products’ lifecycle, security professionals believe that in combination with cloud computing the two methods increase the complexity of the corporate network, making it more difficult to defend, the cyber security assurance report from Tenable Network Security outlines.