Mike Mimoso talks to Cigital CTO and software security pioneer Gary McGraw about the latest results pulled from the Building Security In Maturity Model (BSIMM).
Browsing Category: IoT
The IoT botnet behind the some of the largest publicly recorded DDoS attacks is flooding its targets with HTTP traffic in Layer 7 attacks.
Researchers sort out what went wrong when an estimated 500,000 DVRs and IP-based cameras were used in a series of massive DDoS attacks in September.
DVR’s, IP-enabled cameras, home cable equipment and many other IOT connected devices are that latest in potent DDoS tools available to attackers.
In Cigital’s seventh annual Building Security in Maturity Model report, cloud, agile software development and IoT factor into maturing secure software movement.
The massive Yahoo breach, this week’s Security of Things Forum, Mamba ransomware, and Google Allo are discussed.
In a keynote at the Internet of Things Forum Dr. Kevin Fu said that medical devices should be subjected to rigor so patients can make clinically relevant decisions.
The Department of Homeland Security formally announced its plan to develop a set of strategic principles for the Internet of Things.
Risks of man-in-the-middle attacks tied to embedded devices that share cryptographic keys and certificates went up sharply over the past nine months.
In this Threatpost op-ed, computer engineer Alexandrea Mellen explores the need for information security concepts in genetic engineering, and how concepts such as the security triad of confidentiality, integrity and availability apply.