Is the Most Important Room in Your Company Really Secure?

Someone Might Be Listening

Mergers and acquisitions. Updates to rolling three-year business plans. New product releases. Company restructures. SEC filings. These are the types of discussions that take place in corporate boardrooms across America. The information shared during these discussions can be of intense interest to competitors, stock manipulators, disgruntled insiders, and other malicious players who can use that information to do harm. With the list of threats […]

Deter and Delay Is No Longer Enough: How IPA Can Help Focus Response Resources and Improve School Safety

Recent events have pointed out the need for new and enhanced approaches to safety and security in schools. While the truth is that active shooter events are rare, the reality is that every school needs to prepare and take steps to minimize the possibility of and the damage that can result from such an event.

Deter, Delay, Respond

Basic security principles define three major functions of a security program: […]

IPA Security for Corrections: Inpixon at Mock Prison Riot 2018

With the ever-growing problem of mobile phones being used by inmates, all Department of Correction (DoC) facilities around the world are working hard to find a solution. Interdiction and manage access solutions can control phones from a cellular perspective, but Inpixon can easily […]

The Shape of Data Protection: Mobile Device Management Intersects the Security Dome

The explosion in wireless technology and applications, smart portable devices, and the Internet of Things (IoT) has made our lives easier, businesses more productive, and access to data and each other ubiquitous. But, that same explosion brought with it increased opportunities for hacks, malware, data leakage, skimming, shimming, and eavesdropping at levels never seen before, leaving enterprises looking for ways to protect themselves.

On the Road from BYOD […]

Smart Technology Connects Buildings. How Are You Managing It?

With the move to smart cities and buildings, is your company aware of all the technology that can connect to your network?

Companies are becoming more connected with Wi-Fi-enabled devices to enhance the workplace, reduce overhead, and enable communication worldwide. There are no longer only Wi-Fi access points and network extenders; now we have Wi-Fi-powered door locks, light switches, […]

By |2018-05-11T10:05:12+00:00May 9th, 2018|Categories: Big Data, IoT, Security|Tags: , , , , , |

Bluesnarfing: The Modern-Day Security Vulnerability in a Wireless and Mobile World

Once known as the next big thing in wireless communication since the invention of mobile phones, Bluetooth technology has since gained a reputation as one of the gaping barriers in mobile and wireless device security — almost as bad as public Wi-Fi access points.

This may seem like a bum rap for Bluetooth. The advanced technology makes it possible for the visually and motion-impaired […]

The Real Reason Your IoT Security Doesn’t Work

We’re being engulfed by the IoT swarm. What’s the real cost? Security professionals are fumbling, and it’s no surprise. Historically, we’re seeing undeniable parallels to cybersecurity’s very foundation.

In it’s beginnings, cybersecurity was straightforward: Security professionals would put up a perimeter firewall, IDS, access control lists, create a layered model, and set up a traditional architecture. Their approach to security was maximized, and they were content. But that’s no longer the case.

Back in 2006, Blackberry […]

To Stay in Business, You Need Physical Cybersecurity

Security cameras watching pedestrians: Cybersecurity

Physical cybersecurity: It’s the new hot-button topic making its way into security news feeds. So why are companies intent on ignoring the warning signs? Efforts to outsmart hackers need to adapt, and quickly.

We know cybersecurity is still under heavy containment. Why? Because security teams weren’t ready for its impact, now or in the past.

Travel back to 1988, when the Morris worm attached […]

How to get the most out of IoT in your hospital

Published June 27th 2017 on HealthcareBusinessTech.

Over the next decade, hospitals will continue increasing their adoption of IoT devices, and see more coming through the doors. It’ll be crucial for IT leaders to identify technology solutions that enable scalable technology infrastructure, risk mitigation and management, and effective ways to draw insights from collected data. In this guest post, Soumya Das, CMO of a provider of data analytics […]

By |2017-07-12T09:34:59+00:00June 27th, 2017|Categories: IoT, News, Security|Tags: , , , , , |

IoT Security: a Distributed Product Failure for the Ages

By Swapnil Bhartiya

Published Jun 23rd on OSENetwork.com

A Curious Case of Internet of Things

Last year millions of IoT (Internet of Things) devices were compromised and turned into zombies to launch massive DDoS attacks that brought down a huge chunk of the Internet. Those were  not isolated cases; every week there is a new breach, a new security failure that poses a serious threat to our infrastructure, our […]