security

Securing Small-Business and Home Internet of Things (IoT) Devices: Mitigating Network-Based Attacks Using Manufacturer Usage Description (MUD)

The guide’s example solutions demonstrate the effectiveness of the Internet Engineering Task Force’s Manufacturer Usage Description Specification in strengthening security for IoT devices on home and small-business networks.

Securing Small-Business and Home Internet of Things (IoT) Devices: Mitigating Network-Based Attacks Using Manufacturer Usage Description (MUD) Read More »

2018 State of Bug Bounty Report

The biggest difference between an unknown vulnerability and a known vulnerability, is the ability to take action on it.

Over the past year, there has been an increase of 21% in total vulnerabilities reported, and an increase of 36% in total bug bounty payouts.

Security leaders are beginning to realize that better awareness and information about disclosed vulnerabilities is critical to their operational success.

2018 State of Bug Bounty Report Read More »

Enterprise IoT Security Architecture and Policy Whitepaper

The IoT Security Foundation (IoTSF) has announced a new whitepaper that outlines the benefits that accrue by taking a hub-based approach to connecting IoT devices and systems in the enterprise. Entitled: IoT Security Architecture and Policy for the Enterprise – a Hub Based Approach the whitepaper proposes a hub-centric architecture approach that will accommodate contemporary and future possibilities

Enterprise IoT Security Architecture and Policy Whitepaper Read More »

Enforcing Data Privacy in the Digital World

2018 saw a continuation of major data breaches in organisations, such as Marriot and Facebook. In honour of International Data Privacy Day (28 January), which brings heightened awareness and education around the importance of recognising and managing data privacy issues, and to help professionals navigate and stay in compliance with data privacy regulations, ISACA, in partnership with ACL, has released a new complimentary white paper, Enforcing Data Privacy in the Digital World.

Enforcing Data Privacy in the Digital World Read More »