Software Contract Solutions

Report: Most IoT transactions are not secure

Data gathered by security provider Zscaler shows that not only are most internet-of-things transactions unsecured, they are also unauthorized as IoT creeps in as shadow-IT devices. The majority of Internet of Things (IoT) transactions don’t use even basic security, and there is a great deal of unauthorized IoT taking place inside the perimeter of enterprise firewalls thanks … Read more

Who should lead the push for IoT security?

Industry groups and governmental agencies have been taking a stab at rules to improve the security of the internet of things, but so far there’s nothing comprehensive. The ease with which internet of things devices can be compromised, coupled with the potentially extreme consequences of breaches, have prompted action from legislatures and regulators, but what … Read more

Cisco software fortifies industrial IoT security

Cisco security architecture learns customer IIoT environment, keeps watch for anomalies. Cisco is looking to better protect myriad edge-attached IoT devices with new security software that promises to protect industrial assets in one of the most disparate of network environments. The company rolled out what it called an overarching security architecture for Industrial IoT (IIoT) … Read more

IoT in 2020: The awkward teenage years

The internet of things will see more growth in 2020, along with more growing pains – security, lack of complete solutions. Much of the hyperbole around the Internet of Things isn’t really hyperbole anymore – the instrumentation of everything from cars to combine harvesters to factories is just a fact of life these days. IoT’s here to … Read more

Cisco: 5 hot networking trends for 2020

Cisco exec says SD-WAN, Wi-Fi 6, multi-domain control, virtual networking and the evolving role of network engineers will be big in 2020. Hot trends in networking for the coming year include SD-WAN, Wi-Fi 6, multi-domain control, virtual networking and the evolving role of the network engineer into that of a network progrmmer, at least according to Cisco. They revolve … Read more

Can microsegmentation help IoT security?

Deploying microsegmentation as part of a broad IoT security strategy can enable more granular control of network systems and better isolation if a security flaw is exploited. The Internet of Things (IoT) promises some big benefits for organizations, such as greater insights about the performance of corporate assets and finished products, improved manufacturing processes, and … Read more

Microsoft finds Russia-backed attacks that exploit IoT devices

Microsoft says default passwords, unpatched devices, poor inventory of IoT gear led to exploits against companies by Russia’s STRONTIUM hacking group. The STRONTIUM hacking group, which has been strongly linked by security researchers to Russia’s GRU military intelligence agency, was responsible for an IoT-based attack on unnamed Microsoft customers, according to the company. a blog post … Read more

7 steps to enhance IoT security

Securing the IoT is a multi-faceted effort that requires big moves as well as small adjustments to ensure networks, systems, data and devices are protected. Here are 7 security practices you might not have considered. One of the biggest concerns with the Internet of Things (IoT) is making sure networks, data, and devices are secure. … Read more

Cisco to buy IoT security, management firm Sentryo

Buying Sentryo will give Cisco support for anomaly and real-time threat detection for the industrial internet of things. Looking to expand its IoT security and management offerings Cisco plans to acquire Sentryo, a company based in France that offers anomaly detection and real-time threat detection for Industrial Internet of Things (IIoT) networks. Founded in 2014 Sentryo … Read more

Edge security: There’s lots of attack surfaces to worry about

Making edge computing safe means applying sound security principles to the unique edge environment. The problem of edge security isn’t unique – many of the issues being dealt with are the same ones that have been facing the general IT sector for decades. But the edge adds its own wrinkles to those problems, making them, … Read more