You are viewing 'IoT'

Solutionary blogs about the Internet of Things (IoT).

Our Continuously Connected Lives: What’s Your “Apptitude”?

To UPnP or not to UPnP

Jeremy Scott

October 27, 2016 - Posted by Jeremy Scott to Security Insight

To UPnP or not to UPnP

As the internet has changed, so have our lives. We no longer just dial up to find that “you’ve got mail,” instead we stay constantly connected through our phones, tablets, and computers. We are now in the age of never leaving home without a device, and being connected to the internet at all times. Some can’t even imagine going out of range.

These devices that are with us at all times are our own personal Internet of Things (IoT). IoT devices can be baby monitors, home entertainments systems, home security systems, or even a refrigerator fully equipped with a video camera so we can check whether we have milk or not.

Vance Baker presented us with Introduction to Internet of Things (IoT) Security earlier this year that provides some really good advice for creating a safe IoT environment. I know what you may be saying: “If I follow the advice given,... read more >

The NTT Security SERT Q3 ‘16 Threat Intelligence Report

Ransomware in the health care industry, the ‘direct cash-back’ revenue model, targeting the Internet of Things (IoT), securing SWIFT networks, and a notable decrease in reconnaissance activity.

Danika Blessman

October 20, 2016 - Posted by Danika Blessman to Threat Intelligence

SERT Threat Report Q3 2016

The NTT Security SERT (Security Engineering Research Team) released its Q3 ‘16 Threat Intelligence Report today.

During Q3 ’16, NTT Security researchers observed attacks which exhibited the same characteristics as those a year ago in Q3 ’15 – a notable decrease in reconnaissance and an increase in application attacks, with attackers likely maintaining a persistent presence in the target environment.

NTT Security observed a 38 percent drop in security-related events from Q2 ’16 to Q3 ’16. While that seems like an amazing statistic, it included a dramatic 91 percent decrease in reconnaissance and a 64 percent decrease in suspicious activity, which may indicate more of a change in focus than a dramatic fall off in attack volume.

... read more >

The Risk of Wearable Tech

A Cyber Security Risk on Your Wrist?

Jacob Faires

June 02, 2016 - Posted by Jacob Faires to Security Insight

Rise of Wearable Tech Technology has come a long way in the last decade.

Smartphones in the ‘90s, outside of Nokia’s N series, weren’t even a thing. Wearable devices were a leftover trend from ‘80s cyberpunk. Images resembling those depicted in Snow Crash and Neuromancer were things of the imagination, but are now becoming part of daily life. “Goggling in” referenced in Snow Crash is a reality made possible by the new rise in virtual reality products like the HTC Vive and Oculus Rift. People are already carrying around what essentially amounts... read more >

Basics of Internet of Things (IoT): Device Configuration and Installation

Vance Baker

February 25, 2016 - Posted by Vance Baker to Security Insight

Internet of Things

In my recent blog, “Introduction to Internet of Things (IoT) Security” we discussed why IoT devices can be a threat and how to create a safe IoT environment to connect IoT devices and use them safely. In this blog, we’ll discuss the IoT device itself and the basics of IoT device configuration and installation. We’ll then cover entertainment/communications and home automation IoT device configurations and security precautions to watch out for.

Turning our attention to IoT devices, we’ll find we can build on home router protections to create a safe environment. Before getting too deeply into this discussion, let’s consider the IoT devices likely to be installed within the home. Generally, IoT devices will fall into two categories, namely entertainment/communications and home automation. Each category represents a unique risk footprint, requiring unique protection methods. One of the features to... read more >

A Valentine Love Letter from Your IoT-enabled Device

7 things you can do to secure our relationship

Aaron Perkins

February 11, 2016 - Posted by Aaron Perkins to Security Insight

IoT Love

To the one who holds the key to my heart,

We have known each other for nearly two months now. We met on Christmas, and I still remember it like it was yesterday.

Your eyes lit up as you held me close, and you knew this was just the beginning of a beautiful relationship between a human and his Internet of Things (IoT)-enabled device.

And indeed it has been just that – a beautiful relationship. But as we make our way through this “month of love”, where flowers and chocolates abound, I feel I really need to share my heart with you – what I’m really feeling.

It’s no secret that we complete each other. In fact, it seems we were made for each other, and... read more >

1 | 2 | 3 | 4 | 5 | Older Entries >>

Voted one of the Best Computer Security Blogs 2016
NTT Security (US), Inc. (formerly Solutionary) is a security consulting and managed security services provider. The NTT Security blog is a place for IT professionals to both learn and talk about the latest in IT security and compliance.

Get the NTT Security Blog delivered to your inbox!

Enter your Email:

(We will not share your email or use it for anything else.)

LATEST TWEETS