Fixing Your Remediation Deficit: The IoT Perspective
Cybercriminals often target IoT systems. Bud Broomhead, CEO, Viakoo, discusses effectively fixing the remediation deficit so enterprises can function and grow without being threatened.
Cybercriminals often target IoT systems. Bud Broomhead, CEO, Viakoo, discusses effectively fixing the remediation deficit so enterprises can function and grow without being threatened.
The CosmicStrand UEFI rootkit is stealthy and persistent, meaning you wouldn’t know if your machine is compromised and even if you do, there isn’t a lot you can do to fix it.
It isn’t enough to protect only your enterprise core and its immediate perimeter. Hackers can exploit even the most trusted vendor and IT supplier to find a backdoor, making supply chain attacks extremely hard to detect. Herre, we discuss the ins and outs of supply chain attacks as well as six preventive measures.
CVE-2022-41040 and CVE-2022-41082 are “strikingly similar†to the ProxyShell vulnerabilities, according to researcher Kevin Beaumont.
Devices become especially vulnerable when performing firmware or application updates. Here are some key principles to follow when ensuring safe and secure updates across the smart device ecosystem.
White hat hackers claim Apple’s homegrown T2 chip that powers Mac hardware has a critical vulnerability that can’t be patched. Reports claim post-2017 Apple devices are at risk of exploitation after hackers claim successful jailbreak of Apple T2 chip.
Find out how zero trust security framework can secure the Internet of Medical Things (IoMT) from cyberattacks.
In partnership with
A lot is going on in cybersecurity right now. Major hacks such as the recent nation-state attack on SolarWinds and Micro…
2020 has seen digital transformation happen at a rapid clip, raising a number of pressing questions for IT professionals. In this article, we look back at six key takeaways from the recently concluded SpiceWorld Virtual 2020 and emerging technology trends that will impact organisations over the next 18 to 24 months.
Vulnerable devices include Microsoft Surface, Lenovo ThinkPad, and Samsung, and Windows Dev Kit 2023.