The State of Security on the Internet of Things

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17
Previous Next

Click through for results from a mobile device security survey conducted by Mocana.

While there is a lot of concern over the security of IT equipment within the enterprise, the landscape of networked computing devices is still much more diverse than people realize.

In fact, a new survey of 15,000 IT and business professionals conducted by Mocana, a provider of security software for embedded systems, finds that while there is more awareness of these issues than ever in the wake of some high-profile attacks such as Stuxnet, most IT organizations are not doing a lot to protect these vulnerable systems.

As a result, most of the survey respondents said it’s only a matter of time before something major happens in their industry.

More Slideshows:

Seven Sexy Smartphones This latest batch of smartphones calls attention to glasses-free 3D technology, front- and rear-facing cameras and Snapdragon processors.

Why IT Projects Fail Recognize the early warning signs of imminent project failure.

2011 Salary Negotiation Tactics Experts offer key pointers on approaching the subject of salary as the economy evolves in 2011.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

email8-190x128 Phishing 101: Beware and Prepare this Holiday Season

With the holiday shopping season upon us, the FBI is warning consumers to be on the lookout for cyber scams and phishing attacks. ...  More >>

Poremba2016Security0x 10 Security Trends to Look for in 2016

So what is on the horizon for 2016? Most experts expect to see continued growth in mobile malware and even more security breaches, especially in the health care and financial industries. ...  More >>

Security86-290x195 Reduce Data Breach Damage by Improving Detection and Response

The new age of security technology will focus on solutions that speed up, automate and ideally combine phases of the typical security process. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.