Women in Information Security: Beth Cornils

Last time, I had fun talking with Victoria Walberg. She really understands cloud and IoT cybersecurity. This time, I got to speak to Beth Cornils. She has a pretty cool job that involves making IoT cars safe! Kim Crawley: Hi Beth! Tell me about what you do. Beth Cornils: I am a product manager for … Read More The post Women in Information Security: Beth Cornils appeared first on The State of Security.
Read more

Apple FaceID Hacked

It only took a week: On Friday, Vietnamese security firm Bkav released a blog post and video showing that -- by all appearances -- they'd cracked FaceID with a composite mask of 3-D-printed plastic, silicone, makeup, and simple paper cutouts, which in combination tricked an iPhone X into unlocking. The article points out that the hack hasn't been independently confirmed,...
Read more

Blockchain 101: How This Emerging Technology Works

Unless you’ve been living in Slab City or off the grid for a while, you’ve probably heard this year’s omnipresent buzzword ‘blockchain.’ But perhaps you’re a bit clueless as to what this newer technology entails. In a recent HSBC survey of 12,000 respondents in 11 countries, 80 percent of people could not explain how blockchain … Read More The post Blockchain 101: How This Emerging Technology Works appeared first on The State of Security.
Read more

Medigate takes a surgical approach to protecting medical devices from cyberattacks

A Savage Security Market ReportGraphic courtesy MedigateOne of the primary challenges with IoT Security is how specific the threats are. While classes of devices have common vulnerabilities and attack surface, most are completely different. It’s unlikely we’ll ever see a single product designed to protect both cars and hospitals, for example. For that reason, Medigate has chosen to focus primarily on addressing hospitals and medical device security.This isn’t just an issue with IoT or specific verticals either. All enterprises, businesses and networks are different and, as such, each product purchased to secure them must be customized to some extent. Studies on shelfware by Osterman Research and 451 Research suggest that the time and effort necessary to implement and manage a solution are linked to the likelihood it will fail and become shelfware. By focusing specifically on medical devices and hospital networks, Medigate aims to streamline the customization process.CompanyMedigate comes out of stealth today, with an impressive $5.35m in seed funding, lead by YL Ventures with additional funding from Blumberg Capital (not to be confused with Bloomberg Beta). Medigate is based in Tel Aviv and is led by co-founders Jonathan Langer (CEO), Itay Kirshenbaum (VP R&D) and Pini Pinhasov (VP...
Read more

Women in Information Security: Victoria Walberg

Last time, I spoke with Nitha Suresh. She’s written IEEE papers and knows her stuff when it comes to pentesting and aircraft data networks. This time, I had the pleasure of interviewing Victoria Walberg. She has a lot of ideas when it comes to IoT and the cloud. Kimberly Crawley: Please tell me about what … Read More The post Women in Information Security: Victoria Walberg appeared first on The State of Security.
Read more

Bkav, FaceTrick

Bkav Corporation's grab for the security spotlight, or something less? You be the judge. More, here... "Q: Can you explain why your hack worked but similar attempts (like Wired magazine's) failed?A: Because... we are the leading cyber security firm ;) It is quite hard to make the "correct" mask without certain knowledge of security. We were able to trick Apple's AI, as mentioned in the writing, because we understood how their AI worked and how to bypass it. As in 2008, we were the first to show that face recognition was not an effective security measure for laptops (related links can be found at the end of this writing)." - via Questions and Answers, Bkav Corporation, November 11, 2017 Permalink
Read more

Smart buildings need cyber-resilience built-in

Internet of Things (IoT) and machine learning are coming together to bring about a sea change in how we use buildings, at home and at the office. Smart infrastructure makes domestic households more energy efficient and allows companies to optimize their real estate. Almost every large enterprise and government organization is currently working on smart infrastructure projects at some level. It’s no surprise that the market for smart buildings is expected to increase four-fold by 2021. The pursuit of greater efficiency and convenience, however, introduces new risks. Many IoT devices and management systems still run on legacy software and lack any kind of security standards. This makes them vulnerable to attacks by hackers. The answer is to build-in cyber-resilience from the beginning starting with securing all connection points using virtual private networks (VPNs).
Read more
Page 1 of 1012345...10...Last »