The U.S. Commerce Department will offer a 90-day reprieve to a handful of companies that conduct business with Huawei before the Trump administration's ban on the use of the Chinese company's technologies fully kicks in, the Wall Street Journal reports. Meanwhile, Google announces it will continue to work with Huawei.
The Department of Homeland Security is warning that Chinese-made drones could be sending sensitive data back to their manufacturers, where it can be accessed by the government, according to news reports.
The lack of secure coding is a pervasive and serious threat to national security, according to a new paper from the Institute for Critical Infrastructure Technology. In an interview, Rob Roy, co-author of the report, outlines what steps should be taken to encourage or enforce secure coding practices.
In this discussion, I'll be covering the automation landscape as it pertains to nefarious actions against hyper connected organizations. We'll begin by talking about what bots were initially designed for and what they've evolved to. My focus will be on the negative effects automation can have on organizations, their...
An independent security researcher is warning about a vulnerability in peer-to-peer software used in millions of IoT devices that could allow a hacker to eavesdrop on conversations or turn these items into a botnet.
A warning that a smartwatch marketed to parents for tracking and communicating with their children could be coopted by hackers leads the latest edition of the ISMG Security Report. It also reviews how a DNS hijacking campaign is hitting organizations and how "dark patterns" trick users.
Mitigating medical device cybersecurity risks can be a matter of life and death, warns federal adviser and security expert Anura Fernando, who says ensuring that medical device network connections are properly managed, monitored and secured is "much like keeping a weapon in a safe with the safety on."
In recent years, Las Vegas has become a prototypical smart city. Between its fully autonomous vehicles and its array of IoT sensors, the city aims to embrace innovation without compromising the security of its 650,000 residents and 42 million annual tourists.
Yet local governments know that internet-connected...
Much like private companies, state and local governments of all kinds are going through a digital transformation at an unprecedented pace: migrating sensitive data to the cloud, installing internet-connected infrastructure, and offering services powered by smart devices.
At the same time, cyber-criminals are also...
The advent of IoT devices and IT/operational technology integration have dramatically expanded the attack surface. And as a result, the definition of threat intelligence is changing, says Vishak Raman of Cisco.
Mirai, the powerful malware that unleashed unprecedented distributed denial-of-service attacks in 2016, has never gone away. And now a new version has been equipped with fresh exploits that suggest its operators want to harness the network bandwidth offered by big businesses.
At Splunk, we're working on creating a data-driven future - embracing new developments around artificial intelligence (AI) and machine learning (ML), IT operations, security and IoT. The goal: to generate positive outcomes from your data.
Pulling together insights from thousands of our customers and our dedicated...
Machine data is generated by many sources, including industrial control systems and applications, sensors and connected devices; it is also one of the fastest growing and complex areas of big data.
Real-time insights from industrial data enable organizations to reduce costs, optimize industrial operations,...
Backers in the U.S. Congress are hoping that the third time is the charm for an internet of things cybersecurity bill that would set minimum security standards for the connected devices that the federal government purchases for various projects.