New DNS vulnerabilities have impacted at least 100 million IoT devices allowing hackers to target devices offline or to take control over them.
New DNS vulnerabilities have impacted at least 100 million IoT devices allowing hackers to target devices offline or to take control over them.
In March, Silicon Valley start up Verkada suffered a significant breach when hackers compromised nearly 150,000 of the company’s cloud-based security cameras. Intruders were able to access camera data collected from schools, prisons, hospitals, and several companies, including Tesla and Cloudflare.
The Internet of Things (IoT) has become prevalent in the healthcare industry due to the benefits derived from sharing patient data and treatment information through connected devices. This convergence of physical assets and digital technologies is the way of the...
IoT technology is dramatically impacting our everyday lives. Cloud computing is simplifying the management of IT infrastructures and reducing costs. As a result, the proliferation of IoT devices, and the shift to cloud-based computing for even mission critical...
The intent of the IoT Cybersecurity Improvement Act 2020 is to ensure IoT technologies purchased and deployed by the U.S. Government meet well-understood security standards. The legislation is based on recommendations developed by the National Institute of Science and...
The United States Federal Government has passed the first Internet of Things (IoT) legislation that prohibits federal agencies from purchasing IoT devices that do not meet specified security protocols. According to the Internet of Things Cybersecurity Improvement Act...
The recently released 2019 Global PKI and IoT Trends Study reinforces the use of PKI for generating secure roots of trust in IoT applications. Unfortunately, the study states that “only 42% of IoT devices in use will rely primarily on digital certificates for...
Smart IoT Security Deriving Business Value from Secure Connected Intelligence Wednesday, November 13, 2019 - Allegro's presentation at the IoT Tech Expo DOWNLOAD SLIDES HERE
In this Information Age article, Dr. Karpliuk provides several reasons for building security into IoT devices rather than trying to bolt it on later. This is exactly the case for 5G deployments – attention must be given to evaluating privacy and security, especially...
Several healthcare and health IT industry groups are asking congress to rethink privacy concerns under the 21st Century Cures Act. While the good intent of the act is to easily facilitate the exchange of health information and provide patients with access to their...
IoT devices are the glue to an interconnected world or things. In some cases those “things” can harvest, digest, store and share their data (which can be your personal data) to a variety of enterprise systems in the cloud. Does big brother really care about what I...
The Internet of Medical Things (IoMT) is part of, and a key enabler for the emerging field of “Digital Health.” While the field holds great promise in chronic condition management, telemedicine, remote patient monitoring and more, it also poses unique cybersecurity...