A publicly accessible server belonging to Level One Robotics and Controls exposed 157 GB of highly sensitive data from hundreds of companies, including Tesla, Toyota and Ford. Read More ▶ |
|
| White Paper: PTC Download this free e-book to discover how companies are realizing proven returns with IoT-enabled remote monitoring, which can be quickly implemented and monetized. Read More ▶ | Researchers warned that 496 million smart devices used by enterprises and in homes are vulnerable to DNS rebinding attacks. Read More ▶ |
| Turn your appliances on/off remotely from your mobile device, or with your voice via Alexa. Or automate with a schedule. The plug also monitors and helps control energy usage, and the slow drain that occurs even when devices aren't in use. Read More ▶ |
| Cyber insurance policies do not typically cover physical destruction or loss of life, but the UK government-backed reinsurer, Pool Re, announced this year it will cover acts of cyber officially deemed "terrorism" by Her Majesty's Government. (Did you spot the catch?) Read More ▶ |
| | Edge computing is fast becoming a new cybersecurity “front line” as users overlook security in their rush to get data and services deployed. Do you have a plan for patrolling the edge? Read More ▶ |
| Discusses research on threats to home routers, which recently became the target of a Russian malware campaign using the “VPNfilter” malware. Read More ▶ |
| Balbix may technically be a vulnerability manager, but it does it so much better and also so much more that it breaks the bounds of its category. Read More ▶ |
| White Paper: PTC In the "Quick Start Guide: Monitoring Equipment with IoT" eBook, Tech-Clarity, an independent manufacturing technology research firm, shows how manufacturers can use remote monitoring to quickly identify failures and efficiently repair equipment. Tech-Clarity provides actionable steps that manufacturers can take to connect remote equipment, gather the right data and put that data to use. Read More ▶ | Editor’s Picks | |
|
|
|