Smart home security starts at home, according to researcher Michael Sverdlin who says that consumers should explore the security of their smart home technology and consider simple modifications or hacks to remove insecure or promiscuous features.
Internet of Things
Fitness apps are proving to be a lot less beneficial to military security than they are for military fitness. That after researchers in the Netherlands discovered that data from the Polar fitness app revealed the homes and habits of those exercising in clandestine locations around the world, including intelligence agencies, military bases, nuclear weapons storage sites and embassies.
Connected devices aren’t just fodder for botnets. They increasingly act as malicious “insiders” capable of spying on their surroundings and providing valuable intelligence on homes and offices, argues Yotam Gutman of the firm Securithings in this industry perspective.
Recognizing the persistent need for security to protect connected devices, industry leaders are collaborating through two separate efforts on Internet of Things (IoT) standards and guidelines to help combat the emerging IoT threat landscape.
A tsunami of security data from Internet of Things endpoints could break the will of SOC analysts. What is needed are better tools for analyzing that data, including the use of machine learning. But AI and machine learning aren’t magic bullets. In this opinion piece, RSA Chief Technology Officer Dr. Zulfikar Ramzan presents a 5 point plan for using analytics in the data center.