IIoT, Mobile and Cloud Security Take Center Stage at RSAC 2017
The RSA Conference (RSAC) is a regular highlight in the IT security calendar. To judge from the record attendance of 43,000 professionals, this year was no exception.
IIoT, Mobile and Cloud Security Take Center Stage at RSAC 2017
The RSA Conference (RSAC) is a regular highlight in the IT security calendar. To judge from the record attendance of 43,000 professionals, this year was no exception.
A priority on today’s to do list: Please secure remote access once and for all!
Most IT devices have some form of remote access, whether via web browser or app. As long as devices are accessed by an authorized user from within an internal network, this isn’t a problem.
Careful Connections are Key to Mitigating Cyber-Attacks on IIoT Systems
In the past, the only way to do this was to drop bombs on them. Today, attacks against critical infrastructure can be just as disruptive when launched in cyberspace.
Top 5 security vulnerabilities are always the same
The research and analyst firm techconsult issued a summary of the five major security vulnerabilities in SMEs and public organizations in Germany at the start of 2017.
Mitigating Retail Vulnerabilities
Retailers are top targets for cybercriminals. According to the 2016 Global Threat Intelligence Report from NTT Group, they receive up to three times the number of attacks as financial institutions - who are next on the list.
Internet of things products are small, networked and unfortunately have almost always little or no security. Sometimes this is down to a lack of willingness by the manufacturer but it is also partly due to the nature of the product – small and light also means