article thumbnail

Free PDF download: Cybersecurity in an IoT and mobile world

Tech Republic Security

This special report from ZDNet and TechRepublic examines the evolving landscape of cybersecurity as mobile and IoT become indispensable tools in the enterprise. Download it as a free PDF ebook.

IoT 167
article thumbnail

Amazon Kindle Vulnerable to Malicious EBooks

Threatpost

Prior to a patch, a serious bug could have allowed attackers to take over Kindles and steal personal data.

IoT 137
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware: A Deep Dive into 2021 Emerging Cyber-Risks

Threatpost

Our new eBook goes beyond the status quo to take a look at the evolution of ransomware and what to prepare for next.

article thumbnail

Creating a Path to Successful Security Hygiene

Cisco Security

If you’re a security and risk management leader, the new ESG eBook is a must-read, so download the Security Hygiene and Posture Management eBook right now. As a result, organizations are further assessing security posture management processes, examining vendor risk management requirements, and testing security more frequently.

article thumbnail

Worthwhile Books, Q3

Adam Shostack

What I gained was an organized way of thinking and a nice reference for thinking through the issues of IOT. Title links to publisher, who sells ebook & print, or you can go to Amazon , who only sells the hardback.) Cyber The Internet of Risky Things , Sean Smith. This was a surprisingly good short read.

Internet 130
article thumbnail

ENISA Threat Landscape Report 2020

Security Affairs

The publication is divided into 22 different reports, which are available in both pdf form and ebook form. Another element of concern is the diffusion of IoT devices , in many cases, smart objects are exposed online without protection. Infographic – Threat Landscape Mapping during COVID-19 ). states the report.

article thumbnail

A week in security (April 3 - 9)

Malwarebytes

Google patches three important vulnerabilities 9 vital criteria for effective endpoint security: Insights from the 'Endpoint Security Evaluation Guide' eBook Stop! Are you putting sensitive company data into ChatGPT? Do cyber regulations actually make K–12 schools safer?

IoT 79