Securing IoT Part V: Artificial Intelligence

Artificial intelligence is a powerful data analytics tool that unfortunately aids cybercriminals as well as cybersecurity personnel. AI in Cyberattacks AI assists cybercriminals in planning…

Securing IoT Part IV: Humans

Human error is the greatest security risk to IoT, often due to oversight or a lack of knowledge. The shift to remote working due to…

Endpoint Security Platforms: EPP and EDR

An endpoint is any computing device attached to an Internet-connected network, like computers, mobile devices, printers, routers or sensors. Over 70% of IT security breaches…

Securing IoT Part III: The Cloud

While cloud service providers are responsible for infrastructure security, it is the responsibility of individual companies to ensure data protection for stored information. McAfee outlines…