New: What is Network Access Control? It’s a simple question, right? Actually, NAC is a broad term in a category that is rapidly evolving. At a high level, NAC just describes a security policy in which specific devices receive differing levels of network access based on a given set of conditions. Early NAC solutions used 802.1X …
Old: The Petya (a.k.a. NotPetya/ExPetr) ransomware campaign is causing disruption to organizations and critical infrastructure around the globe. Similar to the May WannaCry outbreak, it impacts Windows systems and a successful infection results in encrypting the contents of the hard disk. However, unlike “traditional” ransomware attacks, this attack appears to encrypt files without the ability to …
How many devices do you have connecting to your network? What's your IoT X Factor? Find out with ForeScout.
It used to be that computers were the biggest growing product of the technology market.
And a lot of time and money was spent on securing that.
But it’s no longer computers that are growing exponentially.
It’s the internet of things (IoT).
Most organizations have no idea just how many...
Commissioned by ForeScout, the IoT Enterprise Risk Report
employed the skills of Samy Kamkar, one of the world’s leading ethical hackers, to investigate the security risks posed by the Internet of Things (IoT) devices in enterprise environments. Here he shares his findings.
For more information visit http://resources.forescout.com/insecurity_of_things_lp_social.html.