Tag: Internet of Things

Survey: Attacks Find Insecure IoT Devices

A survey finds vast differences in security practices linked to IoT devices in the enterprise, with attacks concentrating on insecure IoT endpoints. 

Podcast Episode 120: They Email Ballots, Don’t They?

In this week’s episode (#120): more than 100,000 U.S. voters submitted their ballots in the last presidential election via email in 2016. Despite that: hardly any attention has been paid to the security of email and online voting systems used by 32 states.

Podcast Episode 119: EFF on Expanding Researchers Rights and AT&T talks IoT Security Fails

Podcast: Play in new window | Download (Duration: 36:29 — 41.8MB)Subscribe: Android | Email | Google Podcasts | RSSIn this episode of the podcast, #119: Electronic Frontier Foundation General Counsel Kurt Opsahl joins us to talk about the Coders’ Rights Project. Also: we speak with Senthil Ramakrishnan, a lead member of AT&T’s IoT Security group about that company’s plans to work with Ericsson to certify the security of IoT devices.

Report: China Eyes IoT as Next Front of Cyber War on U.S.

China is eyeing dominance of the Internet of Things (IoT) market and may use vulnerabilities in these technologies as the next front on its ongoing cyberwar with the United States, according to a new report.

Podcast Episode 117: Insurance Industry Confronts Silent Cyber Risk, Converged Threats

Podcast: Play in new window | Download (Duration: 32:26 — 37.1MB)Subscribe: Android | Email | Google Podcasts | RSSIn this episode of the podcast (#117), we go deep on one of the hottest sectors around: cyber insurance. In the first segment, we talk with Thomas Harvey of the firm RMS about the problem of “silent cyber” risk to insurers and how better modeling of cyber incidents is helping to address that threat. In part II, we invite Chip Block of the firm Evolver back into the studio to talk about the challenge that “converged” cyber physical systems pose to insurance carriers as they try to wrap their arms around their exposure to cyber risk. Editor’s note: as an experiment this week, we’re posting each interview as a separate download, to see if that makes it easier for listeners to jump to the content they’re most interested in. Use the comments […]