Your heart isn't working like it used to, so the doctor recommends a cardiac implant to regulate how your cardiovascular system works. But, unfortunately, shortly after you have this radio frequency or just RF-connected device implanted inside your chest, the... Read More
The botnet was used for its first big wave of attacks on September 19th, 2016, against the French internet hosting company OVH. It was later revealed that OVH was hosting a popular Minecraft server host used to fight DDoS attacks... Read More
If you are a tax preparer, vendor, or tax auditor that handles any information from the United States Internal Revenue Service, especially federal tax data, then IRS 1075 compliance is a must. Read More
The DOD Cybersecurity requirements spelled out in NIST 800-171 have a particular risk assessment requirement for organizations seeking CMMC certification. It states they shall "periodically assess the risk to organizational operations (including mission, functions, image, or reputation), organizational assets, and... Read More
The Institute of Electrical and Electronics Engineers, an organization better known as just IEEE, is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity. Read More
IoT Devices: Constant Growth with Little Oversight IoT and Biomedical devices connect to networks at breakneck speeds, and more and more of them are running in the modern shadow network. A shadow network concept is not new; it is essentially... Read More
The Internet of Things or IoT is one of the fastest growing segments of the IT space. Every minute 127 new connected devices are unleashed upon the world and consumers happily buy them up and plug them into their networks.... Read More
IoTSecure lists 10 ways that smart devices can improve the quality of life for disabled people in their homes. Read More
Weekly IoT Worries: Insecure Ecosystem Interfaces Insecure ecosystem interfaces include a plethora of interface methods that reside inside the ecosystem but outside of the devices themselves that allow unauthorized access to a connected device or its related components. These interfaces... Read More
Weekly IoT Worries: Insecure Network Services This flaw includes those network services running on connected devices that are either unnecessary or insecure. This issue is especially concerning if those services are exposed in any way to the internet. Either way,... Read More
Get a no-obligation, free assessment for your business. identify assets and the risks they bring.
Get an Assessment