Apptimate | Insights
3120
page-template,page-template-blog-masonry,page-template-blog-masonry-php,page,page-id-3120,page-child,parent-pageid-3161,dwpb-push-page,dwpb-allow-close,ajax_fade,page_not_loaded,,select-child-theme-ver-1.0.0,select-theme-ver-3.8.1,wpb-js-composer js-comp-ver-5.1.1,vc_responsive

Insights

The web is just steaming with blogs, company pages, news, etc, about things that interest us.

Since we are all about making things easy we collect interesting news and findings and add our point of view.

Please follow our curated channels on scoop.it:

Security in Internet of Things, Secure CommunicationPrivacy Protection and Mobility for Enterprise.

MEPs Ready To Fight For End-To-End Encryption Across EU

See on Scoop.itPrivacy Protection

A European Parliament committee has called for end-to-end encryption to be enforced on all forms of digital communication

Hyker Security‘s insight:

HYKER End-to-End Encryption protects the full lifecycle of the data from the data producer to the data consumer(s), in an unbroken chain, over time, in transfer and at rest. Inaccessible without the right key, wherever it is for the moment.

15% of All IoT Device Owners Don’t Change Default Passwords

See on Scoop.itSecurity in Internet of Things

Simple statistics can tell you a lot about the state of security in a market niche. For example, if we’d said that just five passwords would grant you access to 10% of all the IoT devices available online, you’d be right to feel concerned.

Hyker Security‘s insight:

Suppliers need to take full responsibility over protecting their customers. You cannot trust a user to change default settings without the right knowledge. So, it is instead a design issue, how you help the user do the right configurations. Eliminate the need to understand the complicated technology. Eliminate the risk of user errors.

European Parliament Proposes Ban On Encryption Backdoors

See on Scoop.itPrivacy Protection

European Parliament Recommends Use of End-to-End Encryption and Proposes Ban On Encryption Backdoors.

Hyker Security‘s insight:

“The protection of confidentiality of communications is also an essential condition for the respect of other related fundamental rights and freedoms, such as the protection of freedom of thought, conscience and religion, and freedom of expression and information,” 

5 fundamentals of IoT security

See on Scoop.itSecurity in Internet of Things

For IoT to grow up we need professional approaches towards security and privacy protection. Anything else will just destroy the market for everyone and make you lose customers and credibility.

Hyker Security‘s insight:

Hyker.io on #IoT #Security

Home Router Botnet Resumes Attacks

See on Scoop.itSecurity in Internet of Things

Yesterday at 7pm UTC (noon PDT) we saw the volume of brute force attacks on the WordPress sites that we protect more than double from the average for the previous 24 hours. The number of attacking IPs more than tripled. The chart below shows the count of attacks per hour from June 12th onward. You can …

Hyker Security‘s insight:

Another day in the life of a botnet

Insiders – Still an organization’s biggest silent cybersecurity threat

See on Scoop.itSecure communication

High-profile data breaches continue to cause executives to turn heads, but are they looking in the right direction?

Hyker Security‘s insight:

To limit the impact of both internal or external data breaches you must control access to data. Granular access authentication and end-to-end encryption are recommended tools to protect data. A single user account breach should only potentially expose the data that user has the right to. Not expose all data on a server. 

 

Cybersecurity must shift it’s focus from securing servers and networks, to securing the actual data, wherever it is.

Thousands of enterprise apps exposing data on back-end servers

See on Scoop.itSecure communication

With so much data apparently exposed via back-end servers, we shouldn’t be surprised if there’s a new wave of thefts and extortion attempts

Hyker Security‘s insight:

The focus must be protecting the data, not the device, network or servers. End-to-end encryption is a strong and useful technology to lock down data and provide access only to authorized users, wherever that data might be.

Sensitive Pentagon Files, Passwords Found on Amazon Server – eSecurity Planet

See on Scoop.itSecure communication

Approximately 28 GB of files connected to the Department of Defense were found on a publicly accessible server.

Hyker Security‘s insight:

 “A single vulnerability or security or process lapse is all it takes to expose highly sensitive private data to the world and get data-jacked. Even with strict security controls in place, breaches such as this still occur due to very basic process failures, leaving extraordinarily sensitive information exposed to the world.”

 

That’s why you need to encrypt your data end-to-end, from production to consumption, at rest and in motion.

Research: 5 in 6 users prefer convenience over security in…

See on Scoop.itSecure communication

Whenever plain text is involved, users are vulnerable to hacks or mass surveillance. Compounding the risk, most communications between users ar

Hyker Security‘s insight:

Security shouldn’t be a feature, but a default for the user. Make it complicated and it will not be used. Make it part of the normal user behavior then it will be used. Security and privacy protection are the responsibility of the app maker, not the user. Especially true with the new GDPR protection law.

 

It must be equally easy to implement for the developers, both in new and existing applications. 

Tracking Hacking: The World’s Biggest Data Breaches

See on Scoop.itSecure communication

Hacking has become more frequent and more serious. Explore the biggest data breaches in history in this data visualization.

Hyker Security‘s insight:

Large breaches become more frequent and more serious despite the increasing awareness of the risks. This shows that traditional approaches aren’t enough anymore. Strong encryption of all data at rest and in motion are important tools that should be implemented to limit the possible damage when someone has breached your firewalls.

Is the world ready for GDPR? Privacy and cybersecurity impacts are far-reaching

See on Scoop.itPrivacy Protection

Is the world ready for GDPR? The privacy and cybersecurity impacts of this new regulation are far-reaching, says ESET’s Stephen Cobb.

Hyker Security‘s insight:

“… the controller or processor should evaluate the risks inherent in the processing and implement measures to mitigate those risks, such as encryption. Those measures should ensure an appropriate level of security, including confidentiality, taking into account the state of the art and the costs of implementation in relation to the risks and the nature of the personal data to be protected.”

82% of Databases Left Unencrypted in Public Cloud

See on Scoop.itSecure communication

Personal health information and other sensitive data is left exposed as businesses overlook encryption and network security.

Hyker Security‘s insight:

Encrypt live data at rest and in motion, end-to-end, from data producer to data consumer. With Hyker.io it’s easy to implement this directly into the application.

Cloud Security: 11 Best Practices – eSecurity Planet

See on Scoop.itSecure communication

Enterprises have a lot of concerns about cloud security, but if they follow best practices, their public cloud deployments may actually be more secure than their internal data centers.

Hyker Security‘s insight:

“Experts recommend finding an encryption product that works seamlessly with existing work processes, eliminating the need for end users to take any extra actions in order to comply with company encryption policies.”

Why don’t more businesses encrypt their emails?

See on Scoop.itSecure communication

Businesses rarely encrypt their email messages because good encryption is too hard to use.  That’s changing. By Randy Battat, Prevail Most business-to-business communication involves sensitive information – stuff that the parties really don’t want others to know about. Whether it’s contracts, customer communications, supplier information, dialog with consultants and contractors, or other things, there’s a…

Hyker Security‘s insight:

The world is eagerly awaiting encryption and key distribution that is easy to implement; hyker.io

Why are IoT developers confused by MQTT and CoAP? – Hyker

See on Scoop.itSecurity in Internet of Things

They’re both designed to be lightweight and to make careful use of scarce network resources. Both have uses, in the correct setting, but the problem is that, due to the relative infancy of IoT development, people don’t know exactly what these protocols are or when to use them.

Hyker Security‘s insight:

HYKER provide drop-in end-to-end encryption for MQTT, CoAP, or any other protocol. HYKER RIKS is unique in how it provides end-to-end encryption in publish-subscribe patterns.

​Windows ransomware: WannaCrypt shows why NSA shouldn’t stockpile exploits, says Microsoft | ZDNet

See on Scoop.itSecure communication

Microsoft’s president and chief legal counsel has renewed a call for a digital Geneva convention following Friday’s WannaCrypt ransomware attacks.

Hyker Security‘s insight:

Stockpiling exploits have the same logical flaw as arguing for backdoors in encryption. The belief that it’s only you that have these tools is just an illusion. Even NSA leaks their exploits, so backdoors will make everyone less safe online. Including the nations and their organizations and citizens the government agencies are there to protect. This is the most important lessons learned from the WannaCrypt attack. 

Backdoors: When Good Intentions Go Bad

See on Scoop.itPrivacy Protection

Requiring encrypted applications to provide backdoors for law enforcement will weaken security for everyone.

Hyker Security‘s insight:

Encryption that you can trust is a fundamental building block of Internet and digital economy. If you cannot have 100% trust of transaction, messages, information, etc. the implications would be devastating.

Why are IoT developers confused by MQTT and CoAP?

See on Scoop.itSecurity in Internet of Things

For device communication, two specialized, competing protocols stand out: Message Queue Telemetry Transport (MQTT) and Constrained Application Protocol (CoAP). They’re both designed to be lightweight and to make careful use of scarce network resources. Both have uses, in the correct setting, but the problem is that, due to the relative infancy of IoT development, people don’t know exactly what these protocols are or when to use them.

Hyker Security‘s insight:

The best explanation about the differences between #MQTT and #CoAP