In response to today’s findings from Krebs on Security of a new strain of Mirai targeting IoT devices for exploitation in attacks and for use as proxies, an expert offers perspective.
In response to today’s findings from Krebs on Security of a new strain of Mirai targeting IoT devices for exploitation in attacks and for use as proxies, an expert offers perspective.
2020 Cybersecurity Landscape: 100+ Experts’ Predictions
Cyber Security Predictions 2021: Experts’ Responses
Experts’ Responses: Cyber Security Predictions 2023
Celebrating Data Privacy Day – 28th January 2023
Data Privacy Protection Day (Thursday 28th) – Experts Comments
Information Security Buzz (aka ISBuzz News) is an independent resource that provides the experts comments, analysis and opinion on the latest Information Security news and topics
It’s worth remembering that if devices are micro-segmented, attackers cannot gain remote access to it because the device itself would not be discoverable in the network, therefore making it invisible. This is the concept behind hardware-enforced isolation – no device should be exposed to the network without an extra hardware layer of protection, eliminating the possibility of attackers using vulnerabilities found inside of the host device.