Security News > 2018 > May > Relying on legacy security technologies leaves you blind to IoT threats
As shadow IoT infiltrate organizations, the variety of risks and threats stemming from these devices put networks and data at risk, according to 802 Secure. IoT and IIoT (Industrial IoT) introduce new IoT networks autonomous from the enterprise network. Organizations are blind to these IoT networks and devices across a plethora of new protocols and frequencies. “While most organizations prepare for IoT enablement, our threat intelligence shows that most companies are still vulnerable to 10 … More → The post Relying on legacy security technologies leaves you blind to IoT threats appeared first on Help Net Security.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/9s9LUx2puBY/
Related news
- Privileged Accounts, Hidden Threats: Why Privileged Access Security Must Be a Top Priority (source)
- MUT-1244 targeting security researchers, red teamers, and threat actors (source)
- Deloitte says cyberattack on Rhode Island benefits portal carries 'major security threat' (source)
- Are threat feeds masking your biggest security blind spot? (source)
- Week in review: MUT-1244 targets both security workers and threat actors, Kali Linux 2024.4 released (source)
- Cross-Domain Attacks: A Growing Threat to Modern Security and How to Combat Them (source)
- FCC Launches 'Cyber Trust Mark' for IoT Devices to Certify Security Compliance (source)