CSE Industry Insights

CSE Industry Insights will be an ongoing source of cybersecurity news, trends and education. Join the conversation on Twitter and Facebook with #CSEIndustryInsights

  • November 23, 2016

    Anthony Caputo
    Pre-Sale Technical Consultant/Architect
    Hitachi Data Systems
    Video Surveillance Hacking – How Weak Controls put IP Camera Feeds at Risk

    A Security Policy Architecture is necessary to identify existing enterprise policies and associate them with policy authorities and supporting roles. The security policy architecture typically contains top level policies that bring together all common themes of operational risk management, across all operational disciplines.

    It is important to identify the current security policies and procedures to incorporate them and/or improve upon them moving forward for security assets. Read full article here

  • November 11, 2016

    Matthew Rosenquist
    Cyber Security Strategist
    Intel Security Group
    Top 5 Things to Know About Recent IoT Attacks

    Recent internet attacks resulted in popular sites becoming unreachable, such as Twitter, Etsy, Spotify, AirBnB, Github, and the New York Times. These incidents have brought to light a new threat to online services: Internet of Things (IoT) botnets. Distributed Denial of Service (DDoS) attacks have been commonplace for over a decade but rarely been too troublesome. For the past several years’ network providers’ security services have been able to absorb such attacks to keep online properties available. But the game has now changed.

    Here are 5 things you should know about the recent IoT attacks:

    1. Insecure IoT devices pose new risks for everyone
    2. IoT devices are valuable to hackers and they won’t give them up without a fight.
    3. DDoS attacks from IoT devices are severe and tough to defend against.
    4. Cybercriminals and hacktivists are driving these attacks.
    5. It will get worse before it gets better.

    Matthew breaks down the 5 things everyone should know about the recent attacks on his LinkedIn page. Read his full article here

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.