Remove third-party-iot-vulnerabilities-we-need-a-cybersecurity-paradigm-shift
article thumbnail

Third-Party IoT Vulnerabilities: We Need a Cybersecurity Paradigm Shift

Dark Reading

The only entities equipped to safeguard Internet of Things devices against risks are the IoT device manufacturers themselves.

IoT 97
article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

Log4j is the latest, greatest vulnerability to demonstrate just how tenuous the security of modern networks has become. It’s notable that open-source software vulnerabilities comprise just one of several paths ripe for malicious manipulation. Related: The exposures created by API profileration. The Sunnyvale, Calif.-based

Security 223
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Decipher Security Podcast With ForAllSecure CEO David Brumley

ForAllSecure

It isn’t about the coolest exploit, the scariest vulnerability, or the largest breach. On April 24, ForAllSecure CEO David Brumley joins Decipher Security host, Dennis Fisher, to talk about the importance of software security as well as the need for better cooperation between developers and security teams.

article thumbnail

Decipher Security Podcast With ForAllSecure CEO David Brumley

ForAllSecure

It isn’t about the coolest exploit, the scariest vulnerability, or the largest breach. On April 24, ForAllSecure CEO David Brumley joins Decipher Security host, Dennis Fisher, to talk about the importance of software security as well as the need for better cooperation between developers and security teams.

article thumbnail

DECIPHER SECURITY PODCAST WITH FORALLSECURE CEO DAVID BRUMLEY

ForAllSecure

It isn’t about the coolest exploit, the scariest vulnerability, or the largest breach. On April 24, ForAllSecure CEO David Brumley joins Decipher Security host, Dennis Fisher, to talk about the importance of software security as well as the need for better cooperation between developers and security teams.

article thumbnail

Cybersecurity Risks of 5G – And How to Control Them

eSecurity Planet

Consumers and organizations are enthused about the operational benefits of more robust mobile connectivity, but the shift to 5G networks doesn’t come without risks. Beyond that, network administrators must be aware of 5G-enabled vulnerabilities and prepare for threat actors seeking to take advantage of a changing ecosystem.

Risk 135
article thumbnail

MY TAKE: How blockchain technology came to seed the next great techno-industrial revolution

The Last Watchdog

Some 20 years ago, the founders of Amazon and Google essentially set the course for how the internet would come to dominate the way we live. Related: Securing identities in a blockchain Today we may be standing on the brink of the next great upheaval. million views on YouTube. Blockchains are a team sport.