Endpoint Security , Internet of Things Security

Countering Attacks That Leverage IoT

Eddie Doyle of Checkpoint Software on Mitigation Strategies
Eddie Doyle, global security strategist, Check Point Software Technologies

How are cybercrime syndicates launching attacks that leverage IoT devices? Eddie Doyle of Check Point Software Technologies offers insights on the latest attack strategies and how to counter them.

See Also: Live Webinar | SolarWinds Breach: If Cyber Companies Can Get Hit, Do You Stand A Chance?

In a video interview at Information Security Media Group's recent Breach Prevention Summit in Washington, Doyle discusses:

  • How high-tech cybercriminals are making hacking easy for low-tech criminals;
  • Why protecting IoT devices from hacking is a significant challenge;
  • What organizations can do to protect themselves.

Doyle is a global security strategist at Check Point Software Technologies. He is responsible for articulating the company's threat mitigation products and services to the marketplace.

About the Author

Nick Holland

Nick Holland

Director, Banking and Payments

Holland, an experienced security analyst, has spent the last decade focusing on the intersection of digital banking, payments and security technologies. He has spoken at a variety of conferences and events, including Mobile World Congress, Money2020, Next Bank and SXSW, and has been quoted by The Wall Street Journal, CNN Money, MSNBC, NPR, Forbes, Fortune, BusinessWeek, Time Magazine, The Economist and the Financial Times. He holds an MSc degree in information systems management from the University of Stirling, Scotland.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.