Connected cars have an ‘indefensible’ security vulnerability

One of the most attractive promises of IoT-powered connected cars is enhanced safety. Connected cars use the Internet of Things (IoT) to help avoid accidents and control a wide array of safety technologies, from anti-lock brakes to airbags. But according to security firm Trend Micro, these safety systems are even more vulnerable to hacking than[…]

FacebookTwitterGoogle+Share

Docker brings containers to mainframes

Docker announced the first major update to its flagship Docker Enterprise Edition 17.06, with a clear eye to on-premises data centers and DevOps.  Docker rolled out the rebranded Docker EE in March, based on what was previously known as the Docker Commercially Supported and Docker Datacenter products. With that launch, Docker added the ability to[…]

How to improve IoT security

The tsunami-sized trend to add intelligence with sensors and actuators and to connect devices, equipment and appliances to the internet poses safety, security and privacy risks. Proof comes from a recent meta-study titled The Internet of Hackable Things (pdf) from researchers at the Technical University of Denmark, Denmark; Orebro University, Sweden; and Innopolis University, Russian[…]

31% off WD 4TB My Passport Portable External USB 3.0 Hard Drive – Deal Alert

Safely store massive amounts of photos, videos and music with this 4TB external drive from WD. It comes equipped with WD Backup software so you can automatically back up photos, videos, music and documents on your preferred schedule. And built-in 256-bit AES hardware encryption with WD Security software helps keep your content private and safe. The[…]

7 free tools every network needs

In the real estate world, the mantra is location, location, location. In the network and server administration world, the mantra is visibility, visibility, visibility. If you don’t know what your network and servers are doing at every second of the day, you’re flying blind. Sooner or later, you’re going to meet with disaster. Fortunately, many[…]

IDG Contributor Network: SDN and a life beyond the death of the internet

For decades, enterprises have relied on the public internet for business-critical SaaS applications and data traffic. The reason why is pretty simple: it’s cost-efficient, it’s easy to use and it’s already there. Compare that to the logistical, financial and implementation challenges of installing an alternative private network, and it’s clear why enterprises have been pretty[…]

IDG Contributor Network: Can U.S. lawmakers fix IoT security for good?

While the Internet of Things (IoT) has carved out a comfortable place for itself in today’s society and markets, many still fear that the interconnectivity-driven phenomenon is extraordinarily vulnerable to outside attacks. A number of U.S. Senators believe they may have a solution to the problem, and have put forward the Internet of Things Cybersecurity[…]

The GDPR Deadline is Fast Approaching; How Enterprises are Readying Themselves

The deadline for compliance with the European Union General Data Protection Regulation (GDPR) is May 25, 2018.  Many organizations have spent countless hours already in their preparation for the deadline, while other organizations are just getting around to reading up on it.  GDPR, like Y2K of a couple decades ago, has international implications that for[…]

44% off Aukey Dash Cam, Full HD Wide Angle With Night Vision – Deal Alert

This 1080p Dash Camera captures video or stills, and is equipped with a motion detector and continuous loop recording. An emergency recording mode can be activated by sharp turns or sudden stops, and automatically captures unexpected driving incidents. The Dash Camera can also record whenever it sees motion in front or create a time-lapse video of[…]

IDG Contributor Network: AMP and ThreatGrid Integration into Meraki UTMs

Lately, I have been spending a lot of time on integrating security systems together, and specifically focusing a lot of my energy on Cisco’s Advanced Threat Security product family. (Disclosure: I am employed by Cisco.) Which is what brings me to Cisco’s Advanced Malware Protection (AMP), which is a solution to enable malware detection, blocking,[…]

True random numbers are here — what this can mean for all of us

For many decades the term “random numbers” meant “pseudo-random numbers” to anyone who thought much about the issue and understood that computers simply were not equipped to produce anything that was truly random. Manufacturers did what they could, grabbing some signals from the likes of mouse movement, keyboard activity, system interrupts, and packet collisions just[…]