Code quality and code security aren’t the same, but they’re closely related. And in the current cyberthreat environment, developers should care about both.
The challenges of video surveillance cybersecurity highlight some of the many issues that plague the use of connected devices in physical security systems.
Posted in Internet of Things | Comments Off on The state of cybersecurity in the physical security industry
Recent government cybersecurity initiatives assume that the federal government has a role to play in securing the IoT and critical infrastructure. Does it?
Posted in Internet of Things | Comments Off on Feds seek to up their cybersecurity game
Cyber-physical attacks are on the rise. As the IoT creeps further into our daily lives, so does the attack surface. What can we do to keep ourselves safe?
Posted in Internet of Things | Comments Off on The cyber-physical convergence is accelerating—and so are the risks
How to prevent IoT hacks: Secure your software before you release it. It’s not that hard. So why aren’t more IoT device manufacturers doing it?
Posted in Internet of Things | Comments Off on The IoT: Still feature rich, security poor
The September GAO cybersecurity report stated that there are about 1,000 outstanding recommendations for automotive, military, and IoT security, among others.
California is all done with weak passwords.
The original version of this article was published in Forbes.
Posted in Internet of Things | Comments Off on Make your home both smart and secure | NCSAM at Synopsys
The Internet of Things is all around us. But it doesn’t stop there—now it’s inside us too. As the era of “connected everything” explodes, so does the use of network-connected medical devices. These interconnected devices, ranging from hospital imaging equipment to implantable pacemakers to infusion pumps, help healthcare providers and patients in a variety of tasks—monitoring vitals, regulating dosages, improving diagnostics, and more. But the convenience of this functionality comes with a trade-off: vulnerability. If attackers gain access to a connected medical device, the potential consequences include severe injury and even death. Consider this:
Taylor Armerding, Synopsys Software Integrity Group senior strategist, gives you the scoop on application security and insecurity in this week’s Security Mashup. What’s in this week’s Security Mashup, you ask? Third-party security party poopers, more Russian meddling in the grid, and patch Apache. Watch this episode below: