Welcome to Smokey's Security Forums.
As a guest you only have limited access to the board and it's features, please consider registering to gain full access!
Registration is free and it only takes a few moments to complete.

Smokey's Security Forums

Please login or register.

Login with username, password and session length
Advanced search  


Windows 10: If you want a highly secure device, follow these rules, says Microsoft

Microsoft has published a new standard for creating a very secure Windows 10 machine.

Windows 10: If you want a highly secure device, follow these rules, says Microsoft

Malware Log Analysis & Removal Help * Ransomware Encryption & Decrytion Techniques * Official Jetico Inc. Support Forums

Share this topic on FacebookShare this topic on MySpaceShare this topic on RedditShare this topic on TwitterAuthorTopic: IDG Contributor Network: Armis wants to resolve the IoT security issue  (Read 59 times)

0 Members and 1 Guest are viewing this topic.

ChubbTopic starter

  • Freebies and Good Deals Mod
  • Administrator
  • *
  • Offline Offline
  • Posts: 66569
  • .: Freebie King
IDG Contributor Network: Armis wants to resolve the IoT security issue
6 June 2017, 3:26 pm

The Internet of Things (IoT) is a big deal. A really big one.

There are approximately 8 billion connected devices on the market today, collectively accounting for 50 percent of internet traffic. And that is but a taste of the future—the number of devices is anticipated to increase 150 percent in the next three years. And where growth like that is predicted, every man and his dog is keen to grab market share. The security for IoT space is no different.

+ Also on Network World: A lack of IoT security is scaring the heck out of everybody +

There are some justified reasons why security in this new IoT context will be different. Connected devices (e.g., laptops, webcams, HVAC systems, etc.) are designed to connect wirelessly, without corporate oversight or control. This creates a dynamic, ever-expanding matrix of connections that not only boosts employee productivity and business efficiency, but simultaneously flies under the radar of security.

To read this article in full or to leave a comment, please click here

Source: Network World Security

>> To obtain the full NetworkWorld Security article, click the link in the first post line <<

* Permissions
You can't post new topics.
You can't post replies.
You can't post attachments.
You can't modify your posts.
BBCode Enabled
Smilies Enabled
[img] Enabled
HTML Disabled

Except where otherwise stated, all content, graphics, banners and images included © 2006 - 2017 Smokey Services™ -- All rights reserved
Design board graphics, banners and images by Meg&Millie - Emma aka Tinker

This site does not store profiling-, tracking-, third-party and/or any other non-essential cookie(s) on client computers and is fully compliant with the EU ePrivacy Directive
Smokey's does not use any Web Analytics/Analysis Service, and also does not use any browser fingerprinting techniques



Smokey's also provides free fully qualified FRST (Farbar Recovery Scan Tool) Log / Malware Analysis & Removal Help and System Health Checks