Stay up to date with the latest news, opinions and free resources from Device Authority.
From company announcements, expert opinion on the latest IoT security issues or helpful guides to support your own organization, use our filters below to find the resources most useful for you.
The recent emergence of the Eleven11bot botnet which has compromised over 86,000 Internet of Things (IoT) devices, underscores the critical vulnerabilities inherent in unmanaged IoT ecosystems. This botnet, reported by The Shadowserver Foundation, primarily targets devices such as security cameras and network video recorders, leveraging them to execute large-scale DDoS attacks against sectors including telecommunications and online gaming platforms.
New tool will simplify the process of discovering every unmanaged device on a network, highlighting vulnerabilities and improving asset security
Continuous monitoring helps organisations to detect and respond to threats in real-time. It’s crucial for protecting against data breaches and ensuring system integrity. This article explains what continuous monitoring is, it’s importance and features, and best practices of continuous monitoring to strengthen your cybersecurity.
Network micro-segmentation is a cybersecurity strategy that divides your network into smaller segments to better manage and secure network traffic. This approach helps prevent unauthorised access and limits the spread of threats within the network.
The Zero Trust Security Framework is a fundamental approach to digital security. It assumes that every user and device is untrusted, requiring continuous authentication. This model helps to protect against the growing number of cyber threats. In this article, we discuss its principles, benefits, and real-world applications.
Want to strengthen your organisation’s ability to withstand and recover from a cyber attack? Given the inevitability of such threats in the digital business landscape, understanding the key elements to cyber resilience is crucial. In this article, we’ll discuss the practical steps to prepare, respond, and ensure continuous operations and ensure resilience to cyber threats.
This event is the perfect opportunity to discover cutting-edge security approaches and learn how to manage risk in the ever-changing cybersecurity world.
Keeping track of every device on your network can feel overwhelming, especially as IT environments grow more complex. Automated network asset discovery simplifies this challenge by continuously identifying and monitoring all connected devices, ensuring complete visibility and stronger security.