article thumbnail

Understanding the U.S. Cyber Trust Mark: A New Era for IoT Security

SecureWorld News

From baby monitors to home security systems, these IoT products have become integral to daily life, yet they also present significant cybersecurity risks. Industry leaders back the initiative Key stakeholders have expressed their enthusiasm for the Cyber Trust Mark's potential to improve IoT security and consumer trust.

IoT 114
article thumbnail

Weekly Update 253

Troy Hunt

Plus, she has to put up with all my IoT shenanigans so that made for some fun conversation, along with how our respective homelands are dealing with the current pandemic (less fun, but very important). Learn how at Arkose Labs’ webinar with Troy July 27 at 10 am PT. Save your seat!

IoT 350
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly Update 356

Troy Hunt

Today was a bit back-to-back having just wrapped up the British Airways Magecart attack webinar with Scott. That was actually a great session with loads of engagement and it's been recorded to so look out for that one soon if you missed it. Anyway, I filled this week's update with a bunch of random things from the week.

article thumbnail

Cybersecurity Snapshot: Tenable Highlights Risks of AI Use in the Cloud, as UK’s NCSC Offers Tips for Post-Quantum Cryptography Adoption

Security Boulevard

And get the latest on open source software security; cyber scams; and IoT security. The bill would require IoT manufacturers and internet service providers (ISPs) to provide clear and timely information about their connected devices support lifecycles. Plus, get fresh guidance on how to transition to quantum-resistant cryptography.

Risk 69
article thumbnail

Webinar on cyberattacks in Ukraine – summary and Q&A

SecureList

About the webinar. Due to time limitations, we could not address all questions during the webinar, so here are our answers for the remaining questions we received in the live session: Q: What are the chances that we’ll see attacks using enterprise resources to launch attacks?

DDOS 120
article thumbnail

5G and IoT: How to Approach the Security Implications

Threatpost

Experts from Nokia, iboss and Sectigo talk 5G mobile security for internet of things (IoT) devices in this webinar YouTube video (transcript included).

IoT 78
article thumbnail

Understanding IoT Security Challenges – An Interview with an Industry Expert

Thales Cloud Protection & Licensing

The Internet of Things (IoT) is rapidly growing and expected to affect all industry verticals as well as our private lives. In this blog, we reached out to our technology partner Nexus to better understand the challenges that the industry faces to ensure safe deployment and management of IoT technologies. Weak authentication.

IoT 92