Podcast: Play in new window | Download (Duration: 33:20 — 38.2MB)Subscribe: Android | Email | Google Podcasts | RSSIn this Spotlight Podcast, sponsored by Trusted Computing Group*, Dennis Mattoon of Microsoft Research gives us the low-down on DICE: the Device Identifier Composition Engine Architectures, which provides a means of solving a range of security and identity problems on low cost, low power IoT endpoints. Among them: establishing strong device identity, doing device attestation and safe deployment at scale and verifying software updates.
Tag: Mobile Threats
Fitness apps are proving to be a lot less beneficial to military security than they are for military fitness. That after researchers in the Netherlands discovered that data from the Polar fitness app revealed the homes and habits of those exercising in clandestine locations around the world, including intelligence agencies, military bases, nuclear weapons storage sites and embassies.
Recognizing the persistent need for security to protect connected devices, industry leaders are collaborating through two separate efforts on Internet of Things (IoT) standards and guidelines to help combat the emerging IoT threat landscape.
A new, extremely evasive botnet has been discovered that takes unique leverage of command and control servers and can completely take over an enterprise device to execute any type of code it wishes, from ransomware to trojans to data extraction, according to researchers at endpoint and mobile security firm Deep Instinct.
In this exclusive interview from April, the head of RSA Labs* says that keeping up with bad guys is only half the job. Security firms also need to work hard to stay relevant as trends like cloud adoption, containerization, microservices and mobility shift the ground under information security providers.