article thumbnail

Who is Responsible for IoT Security?

Outpost24

This piece is part 4 of our ongoing series on IoT security. Don't forget to download the ebook to understand the IoT security gap and how your business needs to address it, today.

IoT 67
article thumbnail

Amazon Kindle Vulnerable to Malicious EBooks

Threatpost

Prior to a patch, a serious bug could have allowed attackers to take over Kindles and steal personal data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IoT Security: The Basics

Outpost24

This piece is part 1 of our ongoing series on IoT security. Don't forget to download the eBook to understand the IoT security gap and how your business needs to address it, today.

IoT 58
article thumbnail

What Makes the IoT so Vulnerable to Attack?

Outpost24

This piece is part 3 of our ongoing series on IoT security. Don't forget to download the eBook to understand the IoT security gap and how your business needs to address it, today.

IoT 64
article thumbnail

The IoT Attacks Everyone Should Know About

Outpost24

This piece is part 2 of our ongoing series on IoT security. Don't forget to download the eBook to understand the IoT security gap and how your business needs to address it, today. Read part 1 here.

IoT 58
article thumbnail

Ransomware: A Deep Dive into 2021 Emerging Cyber-Risks

Threatpost

Our new eBook goes beyond the status quo to take a look at the evolution of ransomware and what to prepare for next.

article thumbnail

How to protect healthcare and life-sciences data from a cyber attack pandemic

Thales Cloud Protection & Licensing

A survey of 230 healthcare security leaders in China, Germany, Japan, the UK, and the US found that a whopping 82% of their healthcare organizations had experienced an IoT-focused cyberattack. But the threat is a lot more insidious. The risks of non-compliance. How to protect healthcare data from a cyber attack pandemic.