Van Wyk: Security Track Record for iPhone Not an Accident
It’s not just luck. Apple has managed to keep the iPhone (and its iOS brethren) safe from any major malware outbreak for 10...
Survey: Ex-employees Keep Access to Corporate Apps, Data at Half of U.S. Firms
Former employees at about half of U.S. companies still have access to corporate applications after they leave their jobs, according to new...
Patch Now: Cisco Closes Nine Serious SNMP Holes in IOS, IOS-XE
Cisco Systems this week issued patches for a series of critical SNMP vulnerabilities in its popular IOS and IOS-XE network infrastructure...
March 16, 2017 | Embedded Systems and Internet of ThingsBy Aaron Turner, IANS Faculty
Some say IoT stands for Internet of Threats, but businesses and consumers are rushing headlong into the adoption of everything from wearables to smart buildings. In this report, IANS Faculty Aaron Turner examines the enterprise risks of IoT and explores defensive tactics to help build a short- and long-term strategy to effectively and securely employ IoT technology.
— CLIENT PORTAL —>
Please Login to continue
Best Practices for Dynamic Business Unit Isolation
Take a Threat Modeling Approach to Protecting Critical IoT Infrastructure
| Faculty Report
Top 5 Infosec Risks in Health Care and What to Do About Them
Poulin: Don't Fear the Reaper - Medical Device Attacks Mainly Target Data