Billions of sensors that are already deployed lack protections against attacks that manipulate the physical properties of devices to cause sensors and embedded devices to malfunction, researchers working in the U.S. and China have warned.
application development
Podcast: Uber Breach Puts Focus on Securing DevOps Secrets
The hack of Uber and the loss of information on 57 million customers is just the latest security incident stemming from what our guest Elizabeth Lawler calls “DevOps secrets” – valuable credentials, APIs and other sensitive information that often end up exposed to the public as a result of lax continuous development operations. In this Spotlight Edition* of The Security Ledger Podcast, sponsored by CyberArk, we talk with Elizabeth about how to contain DevOps secrets and secure the secret super user lurking in modern organizations: highly privileged application code.
Survey finds Device Makers Security Priorities Often Misplaced
Low-hanging Internet of Things security fruit may be left unpicked, as connected device makers fret about the predation of sophisticated hackers, but balk at simple security fixes, a Security Ledger and LogMeIn survey finds. You can download the full report here in PDF format.
Now Online: Securing DevOps without Sinking Productivity
If you missed attending it last month, our September discussion with Jason Sabin, CSO of DigiCert and Davi Ottenheimer of IANS on securing DevOps environments is available for viewing.
McKinsey: CEOs need IoT Security Plan
In-brief: Fewer than one in five managers say their company is ready for the challenge of securing the Internet of Things, and global consulting firm McKinsey says that CEOs need to get a plan, fast.