Thanks to MQTT servers which are either misconfigured or not protected with a password, it is easy peasy to hack a smart home. Shodan shows over 49,000 misconfigured MQTT servers and more than 32,000 which don't have even so much as a password to protect them. Read More ▶ |
|
| White Paper: Hitachi ID Systems, Inc. Privileged accounts, like their name suggests, are accounts designed to provide broad access to systems and data. They are an integral part of every IT infrastructure and play a key role in a large variety of day-to-day operations. Read More ▶ | Amazon’s latest tools help identify where data might be left exposed in your AWS S3 cloud environments. Read More ▶ |
| Over 30 hours of digital content across 399 lectures, which can be viewed on your computer or mobile device. Read More ▶ |
| If "smart" appliances that connect to the internet were to be used in a botnet, it could cause large-scale blackouts of the power grid, researchers warn. Read More ▶ |
| | The three main email security protocols complement one another, so implementing them all provides the best protection. That’s easier said than done, but these tips can help. Read More ▶ |
| While regulation is often seen as antithetical to technological progress, the supply chain is an area where clearly-defined, reasonable directives have had a tremendously positive effect on the security and technological leadership of the US government. Read More ▶ |
| The profound implications of AI and machine learning on security are not lost on governments. Read More ▶ |
| White Paper: Bronze Drum Consulting Discover how machine learning, informed by rich, streaming data, is helping business leaders transform financial services is this white paper from Bronze Drum Consulting. By leveraging cloud services, financial service firms now have the power to put real-time streaming data to work. Read More ▶ | Editor’s Picks | |
|
|
|