iot | Page 8


Over the past year or so we’ve heard lots about segmentation and micro-segmentation as new ways to build effective cyber defences in enterprise networks and data centres… but is it enough? Can we delve even deeper? I believe there may be a third leg to the segmentation stool: pico-segmentation.   Before I explain, I think it worth a moment or two to talk about the first two legs of the stool. Segmentation or network segmentation is really all about controlling the flow of traffic from... [Read More]
by RSS Tyson Macaulay  |  Feb 23, 2016  |  Filed in: Industry Trends
Most people are familiar with fractals, if not by name but by appearance. Wikipedia defines a fractal as “…a natural phenomenon or a mathematical set that exhibits a repeating pattern that displays at every scale.” Perhaps the most famous example of a fractal is the Mandelbrot set, which is shown below.    Figure 1: The Mandelbrot Set. Image Copyright Wikimedia - Creative Commons.   The key takeaway here is that no matter how far you “zoom in” on the fractal, the patterns you... [Read More]
by RSS Tyson Macaulay  |  Jan 26, 2016  |  Filed in: Industry Trends
Summary In March 2015, a Network Configuration Leak vulnerability was disclosed to Ring as part of FortiGuard's Responsible Disclosure process. The vulnerability existed on their first internet-connected doorbell, Doorbot v1.0 but other posts on the subject show that the vulnerability was ported on newer versions of the connected doorbell as well. The vulnerability had been granted CVE-2015-4400: DoorBot Network Configuration Leak. We have issued an Advisory and IPS signatures (DoorBot.Network.Configuration.Leak) for the same. We... [Read More]
by RSS Ruchna Nigam  |  Jan 22, 2016  |  Filed in: Security Research
For the 18th edition of the Association of Antivirus Asia Researchers conference, we flew to Da Nang in the beautiful country of Vietnam. Every major security vendor was present, not only those from Asia. After two full days of presentations, we would like to call out the briefings we enjoyed the most. I would say as usual that Mikko Hypponen from F-Secure gave a good talk about Securing Our Future, reaffirming that our job is to protect users globally and that the key for that is to work altogether. That means not... [Read More]
by RSS David Maciejak  |  Dec 09, 2015  |  Filed in: Industry Trends
(Author's disclaimer: I originally pitched this as a humor piece, but the more I wrote, despite the light-hearted tone, the more serious I realized this is/was/will be.)  In Chapter II of Lewis Carroll's Alice in Wonderland, Alice, having eaten a small cake labeled "Eat Me" but with no other instructions or advisories, finds herself growing so tall that she considers communicating with her feet by mail, using the address:     Alice's Right Foot, Esq.        Hearthrug,    ... [Read More]
by RSS Daniel Dern  |  Sep 24, 2015  |  Filed in: Business and Technology
The internet is built on a flawed design – this is actually well known. The whole network security industry grew because of this weak foundation. Let's not build the Internet of Things (IoT) on yet another flawed design.  The number of connected devices is growing quickly. Some experts estimate that there will be nearly 50 billion connected devices by 2020. A network of compromised IoT devices can be misused for DDoS attacks, cyber warfare, spying, reconnaissance, spreading malware, coordinating advance persistent... [Read More]
by RSS Hemant Jain  |  Jul 20, 2015  |  Filed in: Industry Trends
Recently, Beam Technologies announced it would be creating a dental insurance around its connected toothbrushes. Nest also announced it was teaming up with another insurance company, American Family. As a matter of fact, for the better and the worst, this is exactly the kind of connection which is going to raise interest in hacking and/or infecting connected objects. Insurance Fraud. Imagine a fire started at home because one of your halogen lamps set fire to your curtains in the dining room. But you'd rather blame an issue with your oven... [Read More]
by RSS Axelle Apvrille  |  Jul 09, 2015  |  Filed in: Industry Trends
Organizations often allow the use of social media on their networks, but RSAC is buzzing about the risks. Does your organization allow employees to access social media at the office? Many do, whether for strictly personal use, communication, collaboration, or marketing. There is a fair body of both anecdotal and research-based evidence that suggests opening up social channels at work keeps employees happier and more productive. Frankly, with the ubiquity of smartphones, employees are using social networks whether your policies prevent it or not. Employer... [Read More]
by RSS Chris Dawson  |  Apr 27, 2015  |  Filed in: Industry Trends
Tucked deep in the Pacific Northwest, there is a global battle being faught. The battle is over the world’s data and no company is safe. But as Digital Strategy Director, Jonas Tichenor shows us, there is a team of hackers and analysts detecting, analyzing, and stopping attacks, sometimes before they start! [Read More]
by RSS Jonas Tichenor  |  Apr 20, 2015  |  Filed in: Business and Technology
Recently, I wrote about the three vectors of a healthcare cyber attack. This is the third of a three-part series examining each vector in depth with some new perspectives here at HIMSS. Recently, I’ve been writing about the three vectors of a healthcare cyber attack. Last week, I introduced the idea of the Internet of Medical Things when I talked about connected medical devices. These devices sit in hospitals and doctors’ offices, clinics and nursing homes. They range from IV pumps to CT scanners. They are, however, just the tip of... [Read More]
by RSS Ryan Witt  |  Apr 16, 2015  |  Filed in: Industry Trends