article thumbnail

Study: Consumer security savvy is way behind IoT threat landscape

Tech Republic Security

A new Comcast study hints at a major risk to businesses, governments and public systems due to poor cybersecurity in the booming Internet of Things industry. The post Study: Consumer security savvy is way behind IoT threat landscape appeared first on TechRepublic.

Study 511
article thumbnail

Cloud creates network blind spots, complicates problem resolution

Network World

As network environments become more complex, network teams struggle to gain visibility across internet and cloud components, citing blind spots and a lack of skilled workers as contributing factors to slow problem resolution, according to a Broadcom report.

Network 503
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

More than one-third of cloud environments are critically exposed, says Tenable

Network World

In the first half of this year, 38% of organizations had at least one cloud workload that was critically vulnerable, highly privileged, and publicly exposed, according to a study of telemetry from customers of cloud security vendor Tenable released this week. The cloud is a tool like any other; how you use it is what matters,” he said.

Cloud 505
article thumbnail

Study: Most enterprise IoT transactions are unencrypted

Network World

Of the millions of enterprise- IoT transactions examined in a recent study, the vast majority were sent without benefit of encryption, leaving the data vulnerable to theft and tampering. percent of transactions by internet of things devices took place over plaintext, while 8.5 percent were encrypted with SSL.

Study 419
article thumbnail

Patch ‘Em or Weep: Study Reveals Most Vulnerable IoT, Connected Assets

Tech Republic Security

New Armis study lists the most vulnerable. Phones, tablets and workstations with unpatched CVEs are a clear and present danger.

Study 491
article thumbnail

Threats delivered over encrypted channels continue to rise

Network World

Zscaler eliminates this risk and the attack surface by keeping applications and services invisible to the internet. Prevent initial compromise Zscaler Internet Access (ZIA) performs full TLS/SSL inspection to verify every connection and stop hidden threats without sacrificing performance. Case study: Learn how Wipro blocked 8.2M

Malware 366
article thumbnail

New middleware doubles GPU computational efficiency for AI workloads in trials, says Fujitsu

Network World

This month, Tradom also will begin trials using the new product, while Sakura Internet is in the process of a conducting a feasibility study on the use of the technology for its data center operations, according to Fujitsu.