In-brief: a little more than a month after revealing that it was working on guidelines for securing The Internet of Things, the Department of Homeland Security (DHS) on Tuesday published a set of what it calls “strategic principles” for IoT security.
Search Results for "critical infrastructure"
We Need Smart Public Policy for the Internet of Things | IEEE Spectrum
In-brief: is regulation the right approach to securing The Internet of Things or can industry clean up its own act? IEEE Spectrum takes a look.
Cybersecurity: the other Elephant on the Campaign Trail
In-brief: a survey of registered voters finds that concerns about hacking and cyber security loom large in voters’ minds. So why isn’t there more discussion of cyber security and policy on the campaign trail? In this podcast, Security Ledger editor Paul Roberts talks with Ari Schwartz, the Obama Administration’s former Senior Director for Cybersecurity and Israel Barak, the Chief Security Officer at the firm Cybereason about the other elephant on the campaign trail: cyber security policy and hacking. With election day just two weeks away, the U.S. voting population is on pins and needles. While polls suggest that this election will not be as close as those in 2008 and 2012, uncertainty is in the air. One major party candidate is warning frequently of a “rigged” process, and the FBI and Obama Administration have pointed the finger of blame for hacks of major Democratic Party organizations at the government of Vladimir […]
Rapid7 To Advise Firms on Making, Deploying Secure Internet of Things Products
In-brief: The security firm Rapid7 said it is launching a consulting and advisory service to help companies design more secure Internet of Things products and assess the risk of deploying IoT products in corporate environments.
Lightbulbs, Thermostats and Cameras Oh My! Smart Devices Undermining Corporate Security
In-brief: Smart, connected devices from closed circuit cameras to printers and thermostats are undermining the security of businesses, providing possible paths for hackers onto corporate networks, according to a study by the firm ForeScout.