article thumbnail

The surveys speak: supply chain threats are freaking people out

The Security Ledger

A bunch of recent surveys of IT and security pros send a clear message: threats and risks from vulnerable software supply chains are real, and they’re starting to freak people out. The post The surveys speak: supply chain threats are freaking people out appeared first on The Security Ledger with Paul F. Related Stories Forget the IoT.

IoT 98
article thumbnail

Japan’s government hacks citizens’ IoT devices

IT Governance

Earlier this year, the Japanese government launched a campaign in which it hacked into citizens’ IoT (Internet of Things) devices to see how secure the technology is. Once the test is complete, the government will tell the IoT providers about their vulnerabilities and instruct them to address the issues.

IoT 76
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Japanese Government Will Hack Citizens' IoT Devices

Schneier on Security

The Japanese government's decision to log into users' IoT devices has sparked outrage in Japan. However, the government's plan has its technical merits. Many of today's IoT and router botnets are being built by hackers who take over devices with default or easy-to-guess passwords.

IoT 89
article thumbnail

Spotlight: Automation Beckons as DevOps, IoT Drive PKI Explosion

The Security Ledger

Brian Trzupek of DigiCert joins Paul to talk about the findings of a recent State of PKI Automation survey and the challenges of managing fast-growing population of tens of thousands of PKI certificates. The post Spotlight: Automation Beckons as DevOps, IoT Drive PKI Explosion appeared first on The Security Ledger with Paul F.

IoT 98
article thumbnail

Data Governance and Metadata Management: You Can’t Have One Without the Other

erwin

When an organization’s data governance and metadata management programs work in harmony, then everything is easier. Data governance is a complex but critical practice. There’s always more data to handle, much of it unstructured; more data sources, like IoT, more points of integration, and more regulatory compliance requirements.

Metadata 135
article thumbnail

Measuring the Security of IoT Devices

Schneier on Security

In August, CyberITL completed a large-scale survey of software security practices in the IoT environment, by looking at the compiled software. It represents a wide range of either found in the home, enterprise or government deployments. Vendors are Asus, Belkin, DLink, Linksys, Moxa, Tenda, Trendnet, and Ubiquiti.

IoT 82
article thumbnail

Japan to Hunt Down Citizens’ Insecure IoT Devices

Threatpost

Japan will carry out a “survey” of 200 million deployed IoT devices, with white-hats trying to log into internet-discoverable devices using default credentials.

IoT 67