Avoiding Micro-Segmentation Pitfalls: A Phased Approach to Implementation

Micro-segmentation is very achievable. While it can feel daunting, you can succeed by proactively being aware of and avoiding these roadblocks.
Source: Vulnerabilitys & Threats

Hak5 2316 – The Hak5 Annual Blooper Reel!

Celebrate another year of craziness with us by checking out some of our favorite bloopers from 2017!

Happy New Year and we’ll see ya next week!

——————————-
Shop: http://www.hakshop.com
Support: http://www.patreon.com/threatwire
Subscribe: http://www.youtube.com/hak5
Our Site: http://www.hak5.org
Contact Us: http://www.twitter.com/hak5
Threat Wire RSS: https://shannonmorse.podbean.com/feed/
Threat Wire iTunes: https://itunes.apple.com/us/podcast/threat-wire/id1197048999
Help us with Translations! http://www.youtube.com/timedtext_cs_panel?tab=2&c=UC3s0BtrBJpwNDaflRSoiieQ
——————————

Source: Security news


Source: Zologic

TekThing 157 – Amazon Echo Spot Review, Best Gear of 2017, Can You Speed Up Your VPN???

Best of 2017: TVs, Phones, Headphones, More. The Perfect Alarm Clock? Amazon Echo Spot Review. Two Fast VPNs Tested!
——
00:50 BEST OF 2017!!!
What were the products that really stood out in 2017??? AMD’s Ryzen CPUs and Nvidia’s Switch are definitely on our list! We’ve got a couple of TVs, smart phones, and quite a bit more in the video!!!

11:40 Amazon Echo Spot Review
It’s another Echo with a screen, but this time it’s a tiny ball with a round screen… is Amazon’s Echo Spot the ultimate alarm clock? Watch the video for the full review, and if you should buy one now or wait!
http://amzn.to/2CAHtBX

21:43 Speed Up VPN
Ed writes, “I use IPVanish as my VPN installed on my phone. Just recently I have read bad reviews such as bad connection etc.. What is the best paid VPN software that is out there in the market?” We talk about VPN speed, why it varies so much, how you can speed up your VPN, and show the performance we got from PIA and PureVPN on our local network, and how one poor choice in your settings can hose your performance! PCMag has a great roundup of “The Fastest VPNs” that’s worth reading!
https://www.pcmag.com/roundup/351574/the-fastest-vpns

27:31 This Outlet Cooks Electronics!!!
Lyle tweets, “@TekThing is there a way to check if the wall sockets in my home or office is supplying too much power? For reasons known to Thor, my electronics get cooked when connected to certain outlets.” We talk surges/voltage spikes, why Lyle’s refrigerator or AC might be the problem, wiring problems, calling an electrician, and why you really need to get a surge protector on these outlets in the video!

https://en.wikipedia.org/wiki/Voltage_spike

30:57 Do Something Analog!
Like Greg, who “spent this last weekend in October being very analog teaching 8 great students snowshoe making at the 19th annual Winter Camping Symposium at YMCA Camp Miller near Sturgeon Lake MN.” People came from hundreds of miles away. How cool is that? (Seriously cold, actually, Greg says “we awoke to 6″ of fresh snow on Friday morning!”)

Winter Camping Symposium

——
Thank You Patrons! Without your support via patreon.com/tekthing, we wouldn’t be able to make the show for you every week!

https://www.patreon.com/tekthing

EMAIL US!
ask@tekthing.com

SUPPORT:
Amazon Associates: http://amzn.to/2xbnsUa
Subscribe: https://www.youtube.com/c/tekthing
Website: http://www.tekthing.com
RSS: http://feeds.feedburner.com/tekthing
Patreon: https://www.patreon.com/tekthing

THANKS!
HakShop: https://hakshop.myshopify.com/
Dale Chase Music: http://www.dalechase.com/

SOCIAL IT UP!
Twitter: https://twitter.com/tekthing
Facebook: https://www.facebook.com/TekThing
Reddit: https://www.reddit.com/r/tekthingers
——

Source: Security news


Source: Zologic

The Biggest Hacks of 2017 – ThreatWire

The biggest, baddest, worst hacks and vulnerabilities of 2017! All that coming up now on ThreatWire.
——————————-
Shop: http://www.hakshop.com
Support: http://www.patreon.com/threatwire
Subscribe: http://www.youtube.com/hak5
Our Site: http://www.hak5.org
Contact Us: http://www.twitter.com/hak5
Threat Wire RSS: https://shannonmorse.podbean.com/feed/
Threat Wire iTunes: https://itunes.apple.com/us/podcast/threat-wire/id1197048999
Help us with Translations! http://www.youtube.com/timedtext_cs_panel?tab=2&c=UC3s0BtrBJpwNDaflRSoiieQ
——————————

Yahoo:
https://motherboard.vice.com/en_us/article/8x8b4x/whoops-yahoo-says-2013-hack-actually-hit-3-billion-users
https://www.oath.com/press/yahoo-provides-notice-to-additional-users-affected-by-previously/
https://krebsonsecurity.com/2017/10/fear-not-you-too-are-a-cybercrime-victim/

WannaCry:
https://www.troyhunt.com/everything-you-need-to-know-about-the-wannacrypt-ransomware/
http://blog.talosintelligence.com/2017/05/wannacry.html
https://www.malwaretech.com/2017/05/how-to-accidentally-stop-a-global-cyber-attacks.html

https://www.wsj.com/articles/its-official-north-korea-is-behind-wannacry-1513642537?shareToken=st2d38565d59c24132b421a4b03edb68b5&reflink=article_email_share
https://www.washingtonpost.com/world/national-security/us-set-to-declare-north-korea-carried-out-massive-wannacry-cyber-attack/2017/12/18/509deb1c-e446-11e7-a65d-1ac0fd7f097e_story.html?utm_term=.7c8cb1e154dd

KRACK:
https://www.krackattacks.com/
https://www.kb.cert.org/vuls/byvendor?searchview&Query=FIELD+Reference=228519&SearchOrder=4
https://arstechnica.com/information-technology/2017/10/severe-flaw-in-wpa2-protocol-leaves-wi-fi-traffic-open-to-eavesdropping/

198 Million Voter Data:
http://www.securityweek.com/republican-contractor-exposes-details-198-million-american-voters
https://www.upguard.com/breaches/the-rnc-files
https://gizmodo.com/gop-data-firm-accidentally-leaks-personal-details-of-ne-1796211612

Equifax:
https://arstechnica.com/information-technology/2017/09/equifax-website-hack-exposes-data-for-143-million-us-consumers/

Equifax Confirms March Struts Vulnerability Behind Breach

https://arstechnica.com/information-technology/2017/09/massive-equifax-breach-caused-by-failure-to-patch-two-month-old-bug/
https://www.bloomberg.com/news/articles/2017-09-07/three-equifax-executives-sold-stock-before-revealing-cyber-hack
https://www.equifaxsecurity2017.com/
https://arstechnica.com/information-technology/2017/09/equifax-directs-breach-victims-to-fake-notification-site/

Youtube Thumbnail credit:
https://www.simplilearn.com/ice9/free_resources_article_thumb/roles-of-ethical-hacker-article.jpg

Source: Security news


Source: Zologic

12 Days of Threats

On the first day of Christmas a hacker stole from me,
Thousands in my favorite cryptocurrency…
On the second day of Christmas a hacker stole from me,
Two plain-text passwords and thousands in my favorite cryptocurrency…

We’re sure by now you’ve heard too much Christmas music, so we’ll spare you a full rendition. However, as we approach the end of the year, we’d like to reflect on some of the year’s most notable cyber events.

Freedom Hosting II

Threat description: February 2017 – A first-time hacker from Anonymous took down approximately 20% of all Dark Web traffic this year by breaching Freedom Hosting II (FH2), a Dark Web hosting provider. Anonymous posted messages on all of these sites explaining they did this because FH2 provided services to child pornography and scamming sites. The hackers initially tried to ransom the Freedom Hosting II database for .1 Bitcoin (a little over $100), but later released the information publicly. This information included plain-text emails and passwords, site users, personal information about site administrators, and a write-up of how they breached the systems.

Holiday gift: Bad guys get empty stockings and empty sites

Cloudbleed

Threat description: February 17th, 2017 – Internet infrastructure and security company Cloudflare wasn’t directly targeted by a malicious attack, but likely felt their fair share of panic this year. A security bug affected Cloudflare’s reverse proxies, unwittingly leaking data from Cloudflare customers to other customers. Personally Identifiable Information (PII) was downloaded by crawlers and users during everyday activity. This data included full https requests and responses, client IP addresses, cookies, and passwords. Tavis Ormandy of Google Project Zero, who first identified the issue, was able to get Cloudflare servers to return private messages from dating sites, full messages from chat services, online hotel bookings, and online password manager data. Cloudflare has since reported on the potential impact of the bug.

Holiday gift: Proof that collaboration can identify and fix issues before a malicious actor takes advantage

Wikileaks CIA Vault 7

Threat description: March 7th, 2017 – This year Wikileaks released thousands of pages of CIA software tool and techniques allegedly created in collaboration with British intelligence. This trove of documents, titled Vault 7, serves as a catalogue of advanced tactics for surveillance and cyber warfare, including how to hack into smartphones, computers, and Internet-connected TVs. The CIA has not confirmed the authenticity of these documents, but officials speaking anonymously have indicated that the information from Vault 7 is genuine. Wikileaks has not identified the source of the information. The existence of such documents is not necessarily surprising, but the scope of tools and procedures is alarming. Instructions are also available for compromising Skype, Wi-Fi networks, docs in PDF formats, commercial antivirus programs, WhatsApp, Signal, and Telegram.

Holiday gift: The CIA is there to listen when we have a long day. Now we can be a good friend and hear a bit about theirs as well.

Shadow Brokers

Threat description: The Shadow Brokers first came to public attention with an announcement on Pastebin.com offering tools stolen from the NSA’s hacking division, officially called Tailored Access Operations and colloquially called the Equation Group. Few people offered to take the bait, so The Shadow Brokers chose to publicly release some of the information – all unredacted. The exploits they have released are older and often already issued patches, but still have significant potential for damage. For example, the NSA backdoor used in the WannaCry ransomware, DOUBLEPULSAR, came from one of the Shadow Brokers’ leaks. As of yet it’s unknown exactly who the Shadow Brokers are.

Holiday gift: Catalogues more interesting than SkyMall.

WannaCry

Threat description: May 12th, 2017 – The WannaCry ransomware outbreak serves as evidence that weapons-grade cyber attacks developed by nation states are now being used for profit. WannaCry was one of the first examples of ransomware that had the ability to spread to other (Windows) computers on its own, similar to malware of the past like Conficker. The ransomware was able to spread on its own by scanning for systems vulnerable to MS17-010, exploiting them, and then using a recently leaked NSA backdoor to install the ransomware on the system. Both the exploit, called ETERNALBLUE, and the backdoor, DOUBLEPULSAR, came from the recent “Lost in Translation” dump leaked by the Shadow Brokers. The United States government has officially blamed North Korea for WannaCry.

Holiday gift: Some tissue for those impacted by WannaCry.

Petya/NotPetya/Nyetya/PetrWrap

Threat description: June 27th, 2017 – The Petya malware rapidly spread across Europe and North America and infected tens of thousands of systems in more than 65 countries. The Petya ransomware trojan is speculated to be a part of a Ransomware-as-a-Service (RaaS) malware family that was first advertised by Janus Cybercrime Solutions as a RaaS in late 2015. The initial infection vector is believed to be contaminated software updates from Ukrainian financial tech company MeDoc. Anton Geraschenko, an aide to the Ukrainian Interior Minister, has stated that this infection was “the biggest in Ukraine’s history.” The estimated damages associated with NotPetya reached into the millions for companies like French construction group group Saint-Gobain, who lost an estimated $387 million.

Holiday gift: Nothing. Ransomware still sucks 🙁

Hackers Target Nuclear Facilities

Threat description: July 2017 – Critical infrastructure such as nuclear and energy facilities are frequently targeted by advanced persistent threat actors. Early this year the Department of Homeland Security and the Federal Bureau of Investigation released a joint report indicating that companies such as the Wolf Creek Nuclear Operating Corporation had been targeted by hackers. The various attack methods included targeted emails with malicious Word docs, man-in-the-middle attacks (redirecting internet traffic through malicious machines), and watering hole attacks (compromising legitimate websites). Evidence points to Russian hacking group “Energetic Bear” as the culprit. Luckily, no real damage was done.

Holiday gift: Energy sector > energetic adversaries

Ethereum

Threat description: July 2017 – Popular computer platform Ethereum was victim to multiple hacks in 2017. On separate occasions cyber criminals stole > $1 million, $7.4 million, and later $32 million worth of “ether” tokens, the second most widely-used cryptocurrency. For the latter hack, white hat hackers (the good guys) drained $75 million worth of ether from other accounts to protect it from thieves by exploiting the same vulnerability. Ethereum’s problems didn’t end there- a glitch later in the year caused $300 million to be frozen in Parity multi-signature wallets. Parity Technologies suggested a fork (think hard reset) to “unlock” the funds like the one enacted after the DAO hack.

Holiday gift: We’ve identified a better solution than Nutcrackers for a tough nut to crack – white hat hackers.

MongoDB

Threat description: September 2017 – Open-source document database MongoDB had over 27,000 databases wiped and ransomed for their restoration. The targeted databases were running with default settings, making it easy for attackers to find and exploit them. Unfortunately, many of the companies that paid the ransom were never given back their data. Without proper management of permissions and settings, services like MongoDB present an easy opportunity for attackers.

Holiday gift: Security best practices from MongoDB, and a reminder of their importance. This holiday season try to look at security not as the often-ignored fruitcake, but as the delicious frosting keeping your internet gingerbread house together.

Campaign Hacks

Threat description: 2017 – After the direct foreign influence in the 2016 U.S. presidential election, many were left wondering if the numerous European elections of 2017 would encounter the same challenges. In the Netherlands’ March election, concerns over security were so great that every vote was counted by hand. Interior Minister Ronald Plasterk directly cited Russia as a factor in this decision, along with insecure and outdated counting software. The Macron campaign of France, knowing that a targeted attack was inevitable, engaged in a “cyber-blurring” strategy. Fake email accounts were seeded with false documents to slow down hackers. The French government cyber security agency ANSSI later confirmed attacks on the Macron campaign, but did not officially name Russia as the culprit. The German election did not encounter any direct interference, but they did have a bit of a scare – IT specialists Thorsten Schröder, Linus Neumann and Martin Tschirsich analyzed German voting count software and found numerous security flaws. Overall, it appears that most of the elections were carried out relatively unscathed.

Holiday gift: Putin snuck his way onto the nice list last year and got a bald eagle as an early Christmas gift. This year the EU got him for Secret Santa and gave him nada.

Equifax Data Breach

Threat description: September 7th, 2017 – Equifax announced a major data breach to their systems, exposing data associated with approximately 143 million Americans, 400,000 Britons, and 100,000 Canadians. The exposed data contained a host of Personally Identifiable Information (PII), including addresses, Date of Birth (DOB), full names, dispute documents, and of course Social Security Numbers (SSNs). The exploited vulnerability, “CVE-2017-5638,” was issued a patch in March of 2017, which Equifax failed to apply. With half the population of the United States’ information now exposed, many are calling into question the viability of the Social Security Number system. People should keep on alert for fraud.

Holiday gift: Free credit report monitoring from the same company that lost your information in the first place

BadRabbit

Threat description: October 24th, 2017 – Yet another large ransomware campaign targeted entities in Russia and Eastern Europe and affected predominantly news and media websites. The initial infection vector was believed to be conducted via compromised Russian websites (drive-by downloads), and a fake Adobe Flash Player installer. The ransomware was able to propagate itself through networks via Server Message Block (SMB). Bad Rabbit bears similarities to the WanaCry and Petya ransomware outbreaks earlier in the year.

Holiday gift: A reminder of the movie Donnie Darko. That’s about it.


Source: Honeypot Tech

WatchGuard Dimension 2.1.1 Update 2 now available

We are pleased to announce the availability of WatchGuard Dimension 2.1.1 Update 2. This maintenance release is now available from the Software Downloads Center, together with release notes and update instructions. WatchGuard Dimension 2.1.1 Update 2 addresses several frequently reported issues and introduces some security enhancements, including:

  • APT content names with reserved characters would cause PDF reports to fail

  • Log Collector issue that caused incorrect logging status to be displayed for devices

  • Log Collector process unexpectedly restarts due to large number of simultaneous connections

  • Backup locations are now clearly indicated using sftp:// URLs instead of local mount points

  • Dimension SSH service now correctly rejects weak ciphers

 

Does this release pertain to me?

This release applies to all users of the WatchGuard Dimension network security visibility solution.  We highly recommend that any administrators using WatchGuard Dimension upgrade their solution to 2.1.1 Update 2 to take advantage of the security improvements available in the release. 

 

Software Download Center

Firebox and XTM appliance owners with active support subscriptions can obtain this update without additional charge by downloading the applicable packages from the WatchGuard Software Download Center.

 

Contact

For Sales or Support questions, you can find phone numbers for your region online. If you contact WatchGuard Technical Support, please have your registered appliance Serial Number or Partner ID available.


Source: WatchGuard

TekThing 156 – Plantronics RIG 800LX Atmos Gaming Headset, Best Wire Stripper, Recover Windows Password, Porgs!!!

Plantronics RIG 800LX Atmos Gaming Headset, Best Wire Stripper, Recover Windows Password, MicroSD Card for Switch
—–
Porgs. There are Porgs On Our Set…
Google’s brought AR stickers to the Pixel 2, and Shannon’s Porg obsession is showing!
Google’s new Star Wars AR stickers put Porgs everywhere
http://starwars.wikia.com/wiki/Porg

Recover/Crack Windows Passwords!!!
In the past couple month’s we’ve had some Win 10 and 7 boxes with missing passwords… it’s an fairly fast fix if you have a Windows password reset disk, or the box is tied ot a Microsoft Account. We talk Ophcrack Windows Password Cracker, Offline NT Password & Registry Editor, and Daosoft Password Rescuer in the video. Hint: one is much easier than the others!
http://ophcrack.sourceforge.net
http://pogostick.net/~pnh/ntpasswd/
http://www.daossoft.com/products/windows-password-rescuer.html

Plantronics RIG 800LX Wireless Gaming Headset
We review Plantronics RIG 800LX wireless gaming headset, Dolby Atmos for gaming, and why you don’t need a special headset to get Atmos in Windows 10 or Xbox… you will Dolby Access, tho!
https://www.plantronics.com/us/product/rig-800lx
https://www.dolby.com/us/en/categories/games.html
https://www.dolby.com/us/en/apps/access/pc-xbox.html

Wire Stripper Recco
@NatureBit, aka Bob, tweeted out, “@patricknorton What’s your recommendation for a wire stripper? I need to run new wire for a smart thermostat.” Patrick’s friend Tim showed him the best tool to use about 30 years ago, self adjusting wire strippers. A good current version that’s easy to find is IRWIN Tools VISE-GRIP 2078300 Self-Adjusting Wire Stripper.

http://amzn.to/2yuLHJ3

MicroSD Cards For Switch/Best Place To Buy MicroSD Cards
@GreenArrow374 tweets, “Best place to buy MicroSD cards? Looking for Nintendo Switch storage.” MicroSD cards make GREAT stocking stuffers… who doesn’t want more storage for their phone, camera, Raspberry Pi or Switch??? We discuss the requirements for using a MicroSD card with the Nintendo Switch, how big a card you’ll want, speed, the card Shannon wants for her Switch, and where we buy MicroSD cards in the video!

http://en-americas-support.nintendo.com/app/answers/detail/a_id/22481/~/microsd-card-faq
http://amzn.to/2ytVJKD
http://amzn.to/2BGSOBc

Do Something Analog
Like Brandon, who writes, “Take a look at some pictures of a friend (which you will recognize) and myself doing the 14th Annual Tampa Bay AIDS Walk and 5K! Walking for a great cause. And it came with cool badges!” Pictures in the videos, and great job!!!
—–
Thank You Patrons! Without your support via patreon.com/tekthing, we wouldn’t be able to make the show for you every week!

https://www.patreon.com/tekthing

EMAIL US!
ask@tekthing.com

SUPPORT:
Amazon Associates: http://amzn.to/2xbnsUa
Subscribe: https://www.youtube.com/c/tekthing
Website: http://www.tekthing.com
RSS: http://feeds.feedburner.com/tekthing
Patreon: https://www.patreon.com/tekthing

THANKS!
HakShop: https://hakshop.myshopify.com/
Dale Chase Music: http://www.dalechase.com/

SOCIAL IT UP!
Twitter: https://twitter.com/tekthing
Facebook: https://www.facebook.com/TekThing
Reddit: https://www.reddit.com/r/tekthingers
——

Source: Security news


Source: Zologic

Hak5 2315 – 3D Printer Filaments Explained

Join Shannon Morse and David Randolph to discuss 3D printer filaments and how to shop for the best ones.
Special thanks to David from https://printedsolid.com/ for guest hosting this episode!

——————————-
Shop: http://www.hakshop.com
Support: http://www.patreon.com/threatwire
Subscribe: http://www.youtube.com/hak5
Our Site: http://www.hak5.org
Contact Us: http://www.twitter.com/hak5
Threat Wire RSS: https://shannonmorse.podbean.com/feed/
Threat Wire iTunes: https://itunes.apple.com/us/podcast/threat-wire/id1197048999
Help us with Translations! http://www.youtube.com/timedtext_cs_panel?tab=2&c=UC3s0BtrBJpwNDaflRSoiieQ
——————————

Source: Security news


Source: Zologic

IoT-Driven Cold Chain Tracking Provides Quality Control on the Go

For some products, maintaining strict temperature controls during shipping is critical. Certain pharmaceuticals and vaccines require an unbroken chain of refrigerated environments to guarantee safety and effectiveness. Frozen foods need low temperatures to prevent bacterial growth, which can cause serious illness if consumed. Fresh produce depends on a specific conditions to maintain shelf life once it reaches market.

From production to storage to shipping, it takes multiple technologies to ensure perishable goods reach their destination without compromise. Not only must these products strictly stay within a specific temperature range, but handlers may also need to maintain other environmental parameters, such as changing weather-related humidity and pressure, equipment maintenance and anticipating rises in theft risk along the way. By tapping into sensors and the data they generate, AI-driven data insights are transforming the industry like never before, monitoring sensitive products during transit, identifying whether a shipment is at risk for damage and taking preventive or corrective action.

A picture of a truck.

AI-Driven Traceability

Beyond recognizing better delivery routes, AI can offer real-time assessments of the safety and quality of food and pharma products. By offering those real-time insights, opportunities are created to change the conditions affecting products. Making food and pharma two places where traceability is critical. That traceability extends to consumers’ interactions with cold chain products. AI can help in four categories:

  • Descriptive Analytics can help provide context to analytics, enabling a better understand of the story behind the data, to reduce false positives for a smarter system. It can greatly boost sensor fusion and the integration of combined data from multiple sensors, for example to add vibration alerts corresponding to the higher temperature that occur when a package moving away from the cold chain. If a package falls over in a truck, for example, temperatures won’t rise, preventing false positives for product losses. Examining data post-trip AI can rank the quality of service as well as ranking the service provider.
  • Descriptive Analytics can help provide context to analytics, enabling a better understand of the story behind the data, to reduce false positives for a smarter system. It can greatly boost sensor fusion and the integration of combined data from multiple sensors, for example to add vibration alerts corresponding to the higher temperature that occur when a package moving away from the cold chain. If a package falls over in a truck, for example, temperatures won’t rise, preventing false positives for product losses. Examining data post-trip AI can rank the quality of service as well as ranking the service provider.
  • Diagnostic Analytics enable automated decisions to reduce ping rates if data is running low, or to prioritize certain messages over the others. It can also suppress redundant data, reducing data bandwidth.
  • Predictive Analytics can provide theft forecasting based on data from a combination of sources including combinations of weather plus location, a rainy day plus low visibility day, or a holiday plus time of the day with location. Predictive analytics can rank quality of service in near real-time, even before a trip is over. It can also provide tremendous equipment insights offering everything from battery to sensor failure predictions.
  • Prescriptive Analytics enables maximization of good outcomes. From best mitigation factors to optimizations for the most efficient routs, prescriptive analytics streamline operational efficiency across the cold chain. This includes optimizing green strategies for reduced carbon emissions and lower energy costs.

Blockchain for Cold Chain

There’s never been a more exciting time for those working in the cold chain industry. But what does the future hold? Looking ahead five to 15 years, blockchain promises stronger layers of security for AI-driven networks. With enterprise interest in blockchain heating up, 39 percent of all companies, including 56 percent of companies with more than 20,000 employees, are already looking at blockchain implementation. Linking blockchain solutions to existing product journeys could very well provide even stronger traceability across the entire cold chain — from farm to pharmacy.

To stay informed about Intel IoT developments, subscribe to our RSS feed for email notifications of blog updates, or visit intel.com/IoTLinkedInFacebook and Twitter.


Source: Network News

Security Worries? Let Policies Automate the Right Thing

By programming ‘good’ cybersecurity practices, organizations can override bad behavior, reduce risk, and improve the bottom line.
Source: Cyber Monitoring