article thumbnail

Fed Tech News Roundup 8 July 2015

CTOvision

Pentagon's Silicon Valley unit gets $1.75M for fiscal 2015 - FCW.com FCW (Today) - FCW.comPentagon's Silicon Valley unit gets $1.75M for fiscal 2015FCW.comThe Defense Department's first fulltime outreach office in Silicon Valley is up and running thanks to a July 2 memo from Deputy. Privileged user authentication and PKI are.

Insurance 150
article thumbnail

2016 Internet of Things (IoT) Predictions

CTOvision

Gartner predicts that number of IoT devices in use worldwide will grow from an estimated 5 billion in 2015 to some 25 billion connected devices by 2020. In 2016 there will be a growing number of authentic success stories where the IoT provides real value to consumers and enterprises. Trevor Daughney.

Internet 150
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The internet of trusted things

Dataconomy

IoT device security has become an increasingly pressing issue in recent years, as more and more devices become connected to the internet. IoT device security refers to the measures put in place to protect devices connected to the internet from unauthorized access, theft, and damage. What is IoT device security?

article thumbnail

Should abuse survivors have to disappear from the internet?

The Verge

The advice many survivors like Lorraine receive when they look for help is to leave their online life behind and delete themselves from the internet entirely. A 2015 survey of college students found that nearly 75 percent had experienced some kind of tech-assisted intimate partner victimization in the past year.

article thumbnail

Fed Tech Roundup September 3

CTOvision

Take the 2015 Agile Government Survey. How to limit cyber risk with adaptive authentication - GCN.com. Redesigning Government Work for the Internet of Things - Nextgov. Kubi: Adding Life to Teleconferencing. Fed Tech Roundup September 2. Intel RFP, new NGA maps and another China hack - FCW.com. Business in the U.S.

article thumbnail

New year's resolution for IoT vendors: Start treating LANs as hostile

Network World

The flaw was located in a configuration protocol that worked over the local area network and didn't require any authentication. In 2015, when researchers from vulnerability intelligence firm Rapid7 analyzed nine Internet-connected baby monitors, they found hardcoded credentials in four of them.

LAN 87
article thumbnail

Ransomware Exponentially Increasing as IoT Provides Physical Targeting Opportunities

CTOvision

Ransomware is increasingly targeting multiple industries with downtime and lost productivity as its attack surface expands beyond the virtual realm to the physical via the Internet of Things (IoT), however, organizations can posture against this threat with a comprehensive approach to risk management. million in 2015 to 638 million in 2016.