Internet of Things

Absolute’s Richard Henderson, Other “Ninja Badasses” Weigh in on IoT & Cybersecurity Panel
Absolute’s Richard Henderson, Other “Ninja Badasses” Weigh in on IoT & Cybersecurity Panel

That awesome tweet pretty much summed up an engaging panel discussion on privacy and security concerns related to the Internet of Things (IoT), held last night in Vancouver. Absolute’s own Richard Henderson, Global Security Strategist, was among the “ninjas” at the event, hosted by the Vancouver Entrepreneurs Forum and Ready Room Briefings. Other panelists included Adam Shostack, Founder of Confidenza Security, Eric Winsborrow, CEO of Distrix Networks, Ryan Wilson, CTO...

READ MORE
Federal Report Urges Incoming Administration to Prioritize Cybersecurity
Federal Report Urges Incoming Administration to Prioritize Cybersecurity

The Commission on Enhancing National Cybersecurity established by President Obama recently released a 90-page Report on Securing and Growing the Digital Economy, a report whose explicit purpose was to make recommendations that would strengthen cybersecurity in both the public and private sectors. The report makes specific and excellent recommendations to address urgent cybersecurity challenges, including the obsolescence of the “classic concept of the security perimeter” brought about by mobile...

READ MORE
Predictions for Corporate Data in 2017: The Endpoint is Everywhere
Predictions for Corporate Data in 2017: The Endpoint is Everywhere

As 2016 nears the end, it would be satisfying to gaze back on all the successes that organizations have had in combatting the rising tide of data risks. Sadly, that tide keeps on rising. Data breaches in 2016 are already up 31% over 2015 figures, breaching over 35 million records, a figure set to rise to 1.35 billion breached records with the news of the massive breach at Yahoo....

READ MORE
Your BYOD Devices are Your Biggest Vulnerability
Your BYOD Devices are Your Biggest Vulnerability

Mobile devices are the greatest cyber vulnerability for organizations, suggests a new report. Based on the data on its 10 million mobile device subscriber base and the Zimperium Global Threat Intelligence Lab, the report indicates that 60% of mobile devices in enterprise BYOD environments are vulnerable to known cyberthreats. We’ve noted for years that endpoint devices have continued to expanded the attack surface for cybercriminals, providing an entryway to...

READ MORE
Seeking Clarity for IoT
Seeking Clarity for IoT

When it comes to IT acronyms and technical jargon fly fast and free. We’re always looking for a new way to name things, it seems. Shadow IT. Shadow Data. IoT. Shadow IoT. Security of Things. The desire for clarity through naming conventions can overshadow the message. When it comes down to it, most of the conversations are actually the same. It’s about data security. And it’s also about reputation management....

READ MORE