This topic offers insights and best practices for cybersecurity risk assessment, cyber threat protection strategies, and incidence response for participants and practitioners in the IoT ecosystem.
At Black Hat USA, leaders of McAfee and Google stressed the importance of dialogue in addressing IoT cybersecurity. LAS VEGAS — Christiaan Beek, McAfee’s lead scientist and senior principal engineer, was in the hospital with his expectant wife when he inadvertently learned about a troubling IoT cybersecurity vulnerability. When the ultrasound technician measured the size […]
The chief executive officer of HackerOne, maker of a quickly growing bug bounty program platform, draws inspiration from eSports The startup HackerOne doesn’t fear hackers. It glorifies them. Elite security researchers using the firm’s bug bounty program are commemorated on comic book covers the firm commissions. The company plasters the faces of some of its […]
Security experts and cybercriminals continue to uncover Bluetooth security vulnerabilities. The Internet of Things can be great, but making it great takes thought, and sometimes action. Let’s start by considering this non-technical scenario. A good friend has permitted you to use a fabulous beach house. In the past, the friend would leave the keys with […]