CSE Industry Insights will be an ongoing source of cybersecurity news, trends and education. Join the conversation on Twitter and Facebook with #CSEIndustryInsights
November 23, 2016
Pre-Sale Technical Consultant/Architect
Hitachi Data Systems
Video Surveillance Hacking – How Weak Controls put IP Camera Feeds at Risk
A Security Policy Architecture is necessary to identify existing enterprise policies and associate them with policy authorities and supporting roles. The security policy architecture typically contains top level policies that bring together all common themes of operational risk management, across all operational disciplines.
It is important to identify the current security policies and procedures to incorporate them and/or improve upon them moving forward for security assets. Read full article here
November 11, 2016
Cyber Security Strategist
Intel Security Group
Top 5 Things to Know About Recent IoT Attacks
Recent internet attacks resulted in popular sites becoming unreachable, such as Twitter, Etsy, Spotify, AirBnB, Github, and the New York Times. These incidents have brought to light a new threat to online services: Internet of Things (IoT) botnets. Distributed Denial of Service (DDoS) attacks have been commonplace for over a decade but rarely been too troublesome. For the past several years’ network providers’ security services have been able to absorb such attacks to keep online properties available. But the game has now changed.
Here are 5 things you should know about the recent IoT attacks:
- Insecure IoT devices pose new risks for everyone
- IoT devices are valuable to hackers and they won’t give them up without a fight.
- DDoS attacks from IoT devices are severe and tough to defend against.
- Cybercriminals and hacktivists are driving these attacks.
- It will get worse before it gets better.
Matthew breaks down the 5 things everyone should know about the recent attacks on his LinkedIn page. Read his full article here