By 2020, more than 25 percent of identified cyberattacks in enterprises will involve the Internet of Things, but IoT security will account for less than 10 percent of IT security budgets, warns market research firm Gartner.
Sirin Labs is diving head-first into the highly secure phone market. The company has plans to release a secure mobile device that will cost around $20,000, Android Headlines noted in an article.
The Internet of Things is proceeding full steam ahead but big data worries are piling up in their wake. So finds Argus Insights which recently analyzed over 2.3M tweets to get a read on the market's take on IoT. Two fears stood prominent in the analysis: what will happen to the pool of data from IoT and will it be secured.
The day is coming when being able to sort these things out becomes paramount. Best to think about it now than to wait and find your projects derailed or, find yourself pegged as neatly as an insect to a collector's board.
Although business partner security holes have led to past high profile data breaches such as the Panama Papers incident and the Target breach, a new report finds that the presence of partner threat is still grossly underestimated by IT pros. Further, that most have no plans to address the security risk.
Security firm Symantec is teaming with Rockwell Automation, the world's largest company dedicated to industrial automation and information, to protect industrial control systems, or ICS, from cyberattacks.
MIT researchers' latest, greatest discovery should be welcome by web developers and consumers alike. Called Space, the debugging tool, which MIT announced Friday, can quickly detect application security flaws by poring over tens of thousands of lines of code at once.
Enterprise mobility management provider MobileIron has launched its MobileIron Access product designed to secure enterprise cloud data on mobile devices.
The creators of USB Type-C – The USB 3.0 Promoter Group – have announced a new USB authentication specification. This helps systems to confirm the authenticity of a USB device or charger, "including such product aspects as the descriptors/capabilities and certification status."
Open source code is a convenient and cost-effective way for developers to build apps. However, as CIO noted in a recent article, once that code makes its way into an app, it's rarely ever updated to fix vulnerabilities that are found later down the line. CIO offered up some tips on how to keep open source products secure.