Tag: Connected Devices
-
EU Adopts Cyber Resilience Act for Connected Devices
The European Union Council has officially adopted the Cyber Resilience Act (CRA) which will introduce EU-wide cybersecurity requirements …
-
The Future of Technology: AI, Deepfake, & Connected Devices
The dystopian 2020s, ’30s, and ’40s depicted in novels and movies written and produced decades ago blessedly seem very far off from the …
-
Ordr Unveils Cybersecurity Innovations and Ransom-Aware Rapid Assessment Service to Expand Its Leadership In Connected Device Security
SANTA CLARA, Calif. – October 28th, 2021 – Ordr, the leader in connected device security, announced new cybersecurity features along …
-
Veracode and Finite State Partner to Address Connected Device Security
This article was co-authored by Matt Wyckhouse, CEO of Finite State. Over the past decade, we have seen the rapid adoption and expansion of …
-
7 Cybersecurity Tools On Our Holiday Wish List
The holiday season is upon us. After a difficult year, and facing an even more challenging year ahead, digital defense experts don’t have …
-
Smart Doorbells on Amazon, eBay, Harbor Serious Security Issues
Researchers have found serious security and privacy in 11 different smart doorbells, distributed via online marketplaces like Amazon and …
-
Fitbit Spyware Steals Personal Data via Watch Face
A wide-open app-building API would allow an attacker to build a malicious application that could access Fitbit user data, and send it to …
-
DNS-based security helps Morgan School District navigate COVID-19 disruption
When COVID-19 began to shake the world and a lockdown was necessary, schools closed their doors and faced a series of challenges, including …
-
How to enforce the right policy to keep connected devices in hospitals safe
A microsegmented network ensures that everything can only talk to what it is absolutely required to, and nothing else. That also limits the …
-
SMBs Are Ready to Grow Into Enterprise Mobility Management (EMM) and Beyond
SMBs require the ability to both take on mobile worker use cases and new and specialized deployment scenarios for mobile technology, …
-
Take a Bite Out of Sweyn
If you work in the healthcare industry, you may have heard about a family of vulnerabilities called “SweynTooth.” Researchers from …
●●●