IT Brief Australia logo
Technology news for Australia's largest enterprises

IoT security news stories

Story image
Ransomware
A new report shows RaaS dominates, but defences are gaining the upper hand
While vulnerability disclosures increased 21% in the second half of 2021 and increasingly sophisticated criminal attacks made regular news, organisations fight back with targeted remediation efforts.
Story image
Cybersecurity
US$8 billion market for IoT security services on 4G and 5G networks by 2026
By 2026, IoT cellular connections will number more than 3 billion, with 4G LTE and LPWA networks bearing the brunt of these new connections.
Story image
Internet of Things
Rise of the machines: Security risks of connected devices during COVID-19
The report highlights the risks of vulnerable connected devices at a time when new ransomware attacks are reported almost daily .
Story image
Cybersecurity
IoT connections to generate $16 billion in security revenue as new threat vectors arise
"There are limited IoT security solutions in the market, due in large part to the fragmented nature of the IoT itself."
Story image
IoT security
Research reveals increase in critical, low complexity vulnerabilities
2020 saw a large spike in physical and adjacent vulnerabilities, likely due to the proliferation of IoT and smart devices in use and being tested by researchers.
Story image
Internet of Things
IEEE gears up for World Forum on the Internet of Things 2021
Mark your calendar - these are the dates you need to know for the World Forum on Internet of Things 2021.
Story image
Edge Security
New edge vulnerability revealed by Forescout
AMNESIA:33 is a set of 33 memory-corrupting vulnerabilities affecting four open source TCP/IP stacks: uIP; FNET; picoTCP; and Nut/Net.
Story image
Cybersecurity
Why greater network visibility is needed to reduce the threat posed by IoT in the enterprise
At home and abroad, organisations have joined the rush to embrace Internet of Things (IoT) technology, but a new survey shows they’re only just beginning to wake up to the enormous risk those devices pose, writes ExtraHop A/NZ Regional Sales Manager Glen Maloney.
Story image
Internet of Things
Why it’s critical to ensure your IoT doesn’t become a tangled web of vulnerability
Has your business found a use case for the Internet of Things (IoT) yet? If not, there’s a fair chance it’s already found you.
Story image
Internet of Things
Four IoT giants team up for security solution
Thales, Telstra, Microsoft and Arduino partner to deliver cellular network-based scalable trust for easy-to-deploy IoT applications.
Story image
Internet of Things
Microsoft Azure and Firedome announce collaboration on IoT protection
The integration combines Azure Security Centre for IoT’s threat monitoring and recommendation service with Firedome’s protection and response capabilities. 
Story image
IoT security
Key considerations for consistent IoT manageability and security
To address the risks connected IoT devices pose, it is important organisations come up with a strategy that will ensure every device is monitored and managed, Forescout says.
Story image
Network Security
Exclusive: Aruba security VP on IoT security, encryption, and UEBA
Aruba security VP and chief technologist Jon Green shares his views on how the changing trends are affecting the way networks are secured.
Story image
IoT security
IoT devices lacking basic security assessments
Research firm Independent Security Evaluators (ISE) found 125 vulnerabilities in 13 IoT devices, reaffirming an industry-wide problem of a lack of basic security diligence.
Story image
Identity and Access Management
HID Global acquires PKI-as-a-service solutions provider HydrantID
The acquisition of HydrantID will allow HID Global to offer enterprise customers a broader range of options, plus the flexibility and scalability of PKI-as-a-service.
Story image
Internet of Things
IoT devices leaving businesses open to security risks – Zscaler
IDC has forecast that spending on IoT will reach US$745 billion in 2019 and surpass the US$1 trillion mark in 2022.
Story image
Malware
Check Point: Attackers executing commands remotely with latest malware
Threat actors are quick to try and exploit new vulnerabilities when they emerge, before organisations have had the chance to patch them.
Story image
Ransomware
Attackers upping the ante on evasion and anti-analysis - Fortinet
Cyber-adversaries are becoming more sophisticated in their obfuscation and anti-analysis practices to avoid detection.
Story image
IoT security
Keysight solution helps prevent cyber-attacks on connected vehicles
Potential issues identified post-production, with the risk of recalls, cost orders of magnitude more to repair than when found during pre-deployment testing.
Story image
Internet of Things
ForgeRock launches open source IoT edge controller solution
The IoT Edge Controller runs on smart edge devices, and provides the privacy, integrity and security required for devices to register as identities.
Story image
Cybersecurity
ESET: Will blockchain secure the Internet of Threats?
It is well established that contemporary IoT devices, and their associated cloud services, have a terrible security track record.
Story image
IoT security
CyberX launches automated threat extraction platform
Unlike other traditional threat intelligence, Ganymede focuses on IoT/ICS/OT-specific threat intelligence for industrial and critical infrastructure organisations.
Story image
IoT security
Keyfactor and Thales announce integration to fight code signing cyber-attacks
Keyfactor Code Assure aims to deliver secure code signing to software vendors, mobile app developers, enterprise IT organisations, and manufacturers of IoT devices.
Story image
Edge Computing
Enterprise IoT ecosystem extends beyond corporate devices - Zscaler
The most commonly detected IoT device categories across the Zscaler cloud were IP cameras, smart watches, printers, smart TVs, among others.