Consumers, the security of connected toys is pretty much up to you
Connected toys, a hot holiday seller, aren’t all fun and games. What questions should buyers be asking about the security and privacy of connected toys?
Posted in IoT Security
Connected toys, a hot holiday seller, aren’t all fun and games. What questions should buyers be asking about the security and privacy of connected toys?
Posted in IoT Security
IoT security isn’t keeping pace with the growth in IoT devices. Apparently, this is still news to many users and creators. What can we do to secure the IoT?
Posted in IoT Security
With 36 years of experience, Behshad Rejai, VP of engineering in the Software Integrity Group, shares her views of the future of software development.
Posted in Agile, CI/CD & DevOps, Application Security, Cloud Security, IoT Security
Code quality and code security aren’t the same, but they’re closely related. And in the current cyberthreat environment, developers should care about both.
Posted in IoT Security, Static Analysis (SAST), Web Application Security
The challenges of video surveillance cybersecurity highlight some of the many issues that plague the use of connected devices in physical security systems.
Posted in IoT Security
Recent government cybersecurity initiatives assume that the federal government has a role to play in securing the IoT and critical infrastructure. Does it?
Posted in IoT Security, Public Sector Cyber Security
Cyber-physical attacks are on the rise. As the IoT creeps further into our daily lives, so does the attack surface. What can we do to keep ourselves safe?
Posted in IoT Security
How to prevent IoT hacks: Secure your software before you release it. It’s not that hard. So why aren’t more IoT device manufacturers doing it?
Posted in IoT Security
The September GAO cybersecurity report stated that there are about 1,000 outstanding recommendations for automotive, military, and IoT security, among others.
Posted in Automotive Cyber Security, IoT Security, Public Sector Cyber Security
The new California password law demonstrates lawmakers’ misunderstanding of how connected devices work, how the internet works, and even how passwords work.
Posted in IoT Security, Public Sector Cyber Security, Software Compliance, Quality & Standards