IoT security: Follow these rules to protect your users from hackers, gadget makers told
ZDnet – A government-backed scheme aims to tackle the issue of poor security in the Internet of Things (IoT) by encouraging manufacturers to produce connected devices that are secure by design and easy to update. The Secure by Design code of practice for the IoT has been launched by the Department for Culture, Media and Sport (DCMS) and the National Cyber Security Centre (NCSC) and is based on advice from from industry, security experts, academia, and consumer organisations.
The daily briefing
CyberWire – in the first incident of its kind, an officer of the Chinese intelligence service, the Ministry of State Security (MSS), is in US custody facing hacking charges. Yanjun Xu, a Deputy Division Director in MSS’s Jiangsu State Security Department, Sixth Bureau, was apprehended by Belgian authorities in April and extradited to the US on Tuesday.
Security firm names N.J. man to lead East Coast team
ROI-NJ – A Seattle-based security services company has named a New Jersey man as its East Coast director, heading up its software and other services in the region. IOActive Inc. said Tom Brennan brings more than 20 years of software security expertise to the job, including serving as chairman of the Americas board for CREST International, a nonprofit certification and accreditation organization. He will be based in Rockaway.
Cybersecurity Future Trends: Why More Bots Means More Jobs
Security Intelligence – As the technological world hurls into the 2020s and cybersecurity future trends become reality, many experts expect the industry to evolve rapidly. Among the paradigm shifts still to come from digital innovation, data protection is bound to change and expand beyond the capabilities of today’s most common tools.
Inner Circle Podcast Episode 014 – John Sawyer Discusses the Value of Red Team Assessments
Techspective – My guest for this episode of the Inner Circle podcast is John Sawyer, Associate Director of Services at IOActive. Are you secure? Sure, you’ve invested a lot of time, money and effort to security and you’ve implemented firewalls, spam filters, antimalware solutions, intrusion detection and other security tools, and you’ve developed and implemented security policies–but are you sure they’re effective? Are you confident that you can detect or block an attack right now?

