Home Tags Cybersecurity
Hackers are an ever-present threat today. New code stylometry machine learning algorithms are able to de-anonymize hackers based on style.
Because connected and autonomous vehicles can move at high speeds, they're in their own class when it comes to the risk of being hacked. They require their own class of protections.
Cybersecurity has always been seen as an equation between risk tolerance, compliance and cost. The “When-Not-If” paradigm changes that.
On this IoT For All podcast episode, former NSA analyst Terry Dunlap introduces us to the problem of IoT device firmware vulnerabilities and how to handle them. He also shares his compelling journey from a teen hacker to an operative tracking down terrorists. He shares with us how that path led to co-founding ReFirm Labs.
76 Percent of IoT projects fail. A lack of interdisciplinary collaboration and cybersecurity vulnerabilities are core factors. Let's take a new approach.
With continuous advances in IoT, people’s lives are becoming more connected, easier and better. Our commitment to IoT security must grow with the trend.
IoT security issues arise from bad prioritization and short-termism. Security must be fundamental to IoT product development—even at the MVP stage.
IoT software development is an explosive minefield with more than a few issues along the road. The market requires high-quality solutions, scalable, robust, secure and user-friendly, and IoT development teams have to reassess their standard procedures to take everything into account. Here’s a list of seven software development challenges for IoT projects.
"Credential stuffing" is a dangerous brute force attack to which smart home owners are particularly exposed. We need better admin. and cybersecurity practices.
From smart homes to smart cars to smart cities, IoT enables new government surveillance practices. What should the average citizen make of this?