How to protect your smart home from security threats
This blog post was written by Nick Viney. Have you downloaded the new iOS10 on your iPhone? If you have,...
Unregulated at Any Speed: DoT’s Cybersecurity Policy for Self-Driving Cars
Despite headlines, hype, and hysteria, US government rightly chooses cybersecurity guidance over regulation. The Obama administration today unveiled its long-awaited...
This Year at Black Hat: Danger Drones and Thermostat Ransomware
This blog was written by Bruce Snell. Last week I went to one of the few places hotter than it...
Keeping Your Mobile Device (and Your Personal Life) Safe with IoT
Life is made up of the little things. There are ‘fuzzy feeling’ little things; like when the nice lady in...
Update Your Toaster: How IoT Devices Can Be Conscripted into Botnets
Charles Strite, according to Lemelson-MIT, first introduced the modern toaster in 1926. It was, and remains to this day, a...
What It Takes for Security in the Internet of Things
The next time you buy a car, chances are, it’ll be connected to your phone. Maybe your next refrigerator, thermostat,...
How ransomware attacks will soar with the growth of IoT
This blog post was written by Nick Viney. Last month I wrote about the rise of ransomware, a particularly nasty...
The Smart Home is Coming. Are We Ready for It?
If there’s one topic that has the security community excited, and hopeful at the same time, it’s the Internet of...
Convergence and the Future of Cyber Security
CSE 2016 Future of Cyber Security by Matthew Rosenquist from Matthew Rosenquist The security industry is changing. Technology innovation is...
5G Networks Pose Cyber Risks, Opportunities
Fifth-generation networking (5G) holds the potential for a massive immersion of technology into the lives of people and businesses. It...