We just wrapped up our annual Security of Things Forums in Cambridge and this year, for the first time, in Washington D.C. The events were a great opportunity to assemble some of the top experts in the security of connected devices as well as the policy and business implications of IoT adoption and deployment. Security Ledger’s co-hosts at the Forum, Christian Science Monitor Passcode, have put together a great podcast that features interviews with key participants at the event, including Robert Silvers, assistant secretary of Homeland Security; Julian Goldman of Partners Healthcare; independent hacker Travis Goodspeed; Kevin Fu of Virta Labs; and Rajesh Krishnan, chief marketing officer at HackerOne. The podcast is hosted by Passcode reporter Jack Detsch. Check it out!
Search Results for "cloud"
Microsoft Launches Security Program for Azure IoT
In-brief: Microsoft announced security focused services for IoT developers using its Azure managed cloud platform.
Opinion: Anomaly Detection is no Silver Bullet for Incident Response
In-brief: detecting anomalous behavior is a necessary part of incident response – but it’s also harder than it sounds, argues Alan Hall of BlueCoat Systems in this commentary.
European Commission Ponders Security Labels for IoT | EurActiv.com
The web site EurActiv.com is reporting that the European Commission (EC) is getting ready to propose new legislation to protect machines from cybersecurity breaches. Among the steps they’re considering: labels for Internet-connected devices that tell consumers they are “approved and secure.” Products across industries from energy and consumer goods to automotive and healthcare could eventually be required to use the labels on their products, just as electrical devices currently contain labels that inform consumers how much power they use, EU officials said. Digital policy chiefs Günther Oettinger and Andrus Ansip presented a plan three weeks ago to speed up internet connections to meet the needs of big industries like car manufacturing and agriculture as they gradually use more internet functions. But lawmakers recognize that the transition to more and faster internet connections has caused many companies to worry that new products and industrial tools that rely on the internet will be more vulnerable […]
Shoddy Supply Chain Lurks Behind Mirai Botnet
In-brief: A common, China-based supplier of management software is the common thread that ties together the myriad digital video recorders, IP-based cameras and other devices that make up the Mirai botnet, according to analysis by the firm Flashpoint.