Security & the Internet of Things: IoT, OT, IIoT
1.4K views | +0 today
Follow
 
Scooped by Judy Curtis / SIPR
onto Security & the Internet of Things: IoT, OT, IIoT
February 27, 2018 11:18 AM
Scoop.it!

IoT exploit activity has quadrupled - are you prepared? - IoT Agenda

IoT attacks are on the rise, and traditional security strategies aren't getting the job done. Fortinet's Anthony Giandomenico describes the threat and how to best protect what matters.
Judy Curtis / SIPR's insight:
The dramatic growth of IoT-based malware families illustrates the incredibly prolific nature of this threat. The “proliferate to penetrate” strategy isn’t new, but it’s another reminder that single-point, signature-based anti-malware simply cannot handle the volume, velocity and variety of modern malware. 

For greater protection of networks and data, organizations need to integrate malware defenses capable of detecting known and unknown threats across multiple layers of today’s distributed and dynamic network environment, from endpoints to the core and out to the cloud.
No comment yet.
Security & the Internet of Things: IoT, OT, IIoT

Curated by Judy Curtis / SIPR