IoT devices present danger before, during, and after deployment, and the proliferation of this technology is now a cause for concern from the cybersecurity point of view. Read what Executive Director Andrew Shikiar has to say on security challenges in this contributed piece in Cybersec Asia.


More

Infosecurity Magazine: Microsoft warns of adversary-in-the-middle uptick on phishing platform

Microsoft has observed a proliferation of adversary-in-the-middle (AiTM) techniques deployed through phishing-as-a-service (PhaaS) platforms, the…

Read More →

Cybersecurity Dive: Government investigation puts spotlight on password insecurity

When the U.S. Department of the Interior recently conducted an internal investigation into password security, the…

Read More →

Computerworld: Managed Apple IDs, iCloud, and the shadow IT connection

One new addition will be the ability to sync iCloud Keychain, Apple’s de facto password and…

Read More →