Remove 2003 Remove Firmware Remove IoT
article thumbnail

Measuring the Security of IoT Devices

Schneier on Security

In August, CyberITL completed a large-scale survey of software security practices in the IoT environment, by looking at the compiled software. Data Collected: 22 Vendors 1,294 Products 4,956 Firmware versions 3,333,411 Binaries analyzed Date range of data: 2003-03-24 to 2019-01-24 (varies by vendor, most up to 2018 releases). [.].

IoT 209
article thumbnail

Episode 157: Do we need an FDA for Software? Also: operationalizing Threat Intelligence

The Security Ledger

Sarah Zatko of the Cyber Independent Testing Lab joins us to talk about CITL's big new study of firmware security. » Related Stories Spotlight Podcast: Unpacking Black Hat Hacks with Digicert CTO Dan Timpson Episode 156: Looming over Black Hat: doing Security at Massive Scale Huge Survey of Firmware Finds No Security Gains in 15 Years.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Understanding CISA's New Guide on Software Bill of Materials (SBOM)

SecureWorld News

As a CISO since 2003, I can't stress enough how crucial SBOMs are in today's cyber landscape. It's akin to a recipe that details every ingredient used to create a dish. By providing a transparent view of what's inside the software, an SBOM helps organizations manage and mitigate security risks. "As

article thumbnail

Wireless Security: WEP, WPA, WPA2 and WPA3 Explained

eSecurity Planet

WPA3 is the newest protocol and offers better security features such as stronger encryption, protection against dictionary attacks, and easier setting of IoT devices, but has yet to become widely used. Wi-Fi Protected Access (WPA) is an improvement of WEP introduced in 2003. How Does Wireless Security Work?

article thumbnail

Hurrah – It’s (patch) Tuesday!

IT Security Guru

It started in 2003, with both security and feature updates on the second, and sometimes further feature updates on the fourth, Tuesday of each month at a time when the software giant would bundle up and issue several patches to fix bugs and security vulnerabilities for its operating systems and applications. Growing threat.

VPN 65