by Mirko Zorz - Editor in Chief - Wednesday, 5 March 2014.
Embedded devices are everywhere and they make our lives more convenient, but from a security standpoint, they can be intimidating, especially if we're talking about an infusion pump or a piece of equipment that runs the critical infrastructure.
In this podcast recorded at RSA Conference 2014, Billy Rios, Director of Threat Intelligence at Qualys, provides an understanding of these systems - they are computers after all.
Press the play button below to listen to the podcast:
Posted on 21 October 2104. | Designed for IT and security professionals, the service gives a view of the data exchanged with partner and cloud applications beyond the network firewall. Completely passive, it runs on non-production systems, and does not require firewall changes.
Posted on 15 October 2014. | Lynis unearths vulnerabilities, configuration errors, and provides tips for system hardening. It is written in shell script, installation is not required and can be performed with a privileged or non-privileged account.
Posted on 14 October 2014. | Enabling employees and contractors to bring their own devices to work has become a way of life for many organizations. Many understand that traditional perimeter security defenses are not effective at identifying attacks on mobile devices.