Register to receive our newsletter and join in the conversation on our message boards!
REGISTER NOW
Comments
Newest First | Oldest First | Threaded View
faryl
faryl
1/27/2017 8:11:00 PM
User Rank
IoT Visionary
Re: m3h
J0nny's breakdown makes me want to hack into my own kitchen appliances and put them to good use accruing Bitcoin instead lounging around on my counter all day though!

50%
50%
faryl
faryl
1/27/2017 8:07:08 PM
User Rank
IoT Visionary
Re: Vulnerability Scanner
Agreed. I feel like the service could be best summed up as "it's a start".

50%
50%
freehe
freehe
1/23/2017 1:46:30 PM
User Rank
IoT Visionary
Vulnerability Scanner
This is a great option for companies that have little to no detection measures but to be truly protected you need a comprehensive solution.

No onesize-fits-all works for this vulnerability scanner.

 

50%
50%
freehe
freehe
1/23/2017 1:45:10 PM
User Rank
IoT Visionary
Re: m3h
@j0nnyf1v3, excellent points.

50%
50%
dcawrey
dcawrey
1/14/2017 9:57:05 PM
User Rank
IoT Visionary
Re: m3h
I keep harping IoT needs more visibility. This could be a great option for some organizations. These types of tools will allow systems to keep up with threats that are going to hit IoT. It's inevitable. 

50%
50%
afwriter
afwriter
1/13/2017 11:42:20 PM
User Rank
IoT Visionary
Re: m3h
I was all excited about this until I ready J0nny's breakdown. Though he doesn't paint that great of a picture, BeyondTrust's vulnerability scanner is still something. In a time when we need more cyber security these kinds of announcements give me hope that we are at least moving in the right direction.

50%
50%
j0nnyf1v3
j0nnyf1v3
1/12/2017 9:16:48 AM
User Rank
IoT Novice
m3h
I have had the privilege of testing many different vulnerability scanners and solutions for testing and mitigation, and this is something that will just scare the user who signs up for a free trial(yay, marketing)... Being that IoT is and has been a part of networks since device A could talk to device B of a different type, marketers are getting clever with their stale, clean-hashed unreleased, and are slapping the newest "Pitbull Label" – as I call it – on it and selling it as a new solution to an old problem with a new name.. Sorry so say it.

Although I cannot say that I told the truth on the registration, because...come on... Seriously, I have used this one actually, just to see how it was different.  And for one, you have to install it... For real researchers or hackers, they want a portable version, or non persistent... And with Bullguard you can do that. Or an IT professional could use cloud searches such as Shodan. If you go all out with Kali, Arch, Pentoo, Santoku, you have it all and you can keep it persist or non-persist.... Or make the machine remember what you did, or retain no RAM. And I don't know about the normal advanced researchers, but if I am securing a network, I do NOT want a 3rd party solution that calls home in order to function. Clever .py and some shodan will do all you need. I want to be the only one that knows my vulns... kthx!

If you are one of the "set and forget" types the marketing mentions, then this is for you. Because it will scare you into action. But beyond telling you what a normal scanner does, with certain GUI emphasis on IoT aka Wireless, Bluetooth, and (InsertNameHere)Cast. And it is geared as of now with special focus on only DDoS, which to me is old news already. I don't want to shut you down by accessing your coffee maker, I want to bypass your DmZ via XXXXXx(shhh), access root on your coffee maker, drop a shell, traverse your network, find your DC'S, DNS, Exchange, Storage, Sit and #CampWithAWP where obj.AWP::T43mp01s0nD4t43ncry.py( ); then set back on the beach with my trusty VPN's watching the troves of bitcoin hypothetically stack to the virtual celing.. Or watch my dump ftp's drip-fill with fresh boolened IP. Enterprises are, in all honesty, focused on the wound that can take a band-aid and heal. Not the cancerous holes that lie deep within the networks of connected devices that leave the "barn door wide open" if chained together just so... DDoS... Hurts for a little... Root... Forces forfeit....

 

 j5

50%
50%


Latest Articles
What is Blockchain? How can we solve IoT's cybersecurity issues? Can Blockchain help to make the internet of things secure?
Scott Amyx points to key industrial IoT case studies to watch out for in 2017, and explains why new environments spell new challenges for the IIoT this year.
The global IT, BPM and consulting company Wipro has announced that it has joined the Industrial Internet Consortium, the "global, member-supported organization that promotes the accelerated growth of the industrial internet of things (IIoT)".
The internet of things market is growing exponentially, in value as well as size, and the value of the smart building market is growing in tandem. How can companies on the buy and sell sides take advantage?
D-day has arrived. How kind will Donald Trump's presidency be to smart cities in the United States? And will his presidency impact urban IoT that's further afield?
Upcoming Live Events
May 16-18, 2017, Santa Clara Convention Center
May 16-18, 2017, Santa Clara Convention Center
May 16-18, 2017, Millennium Gloucester Hotel, London
June 13-15, 2017, ExCeL, London
June 13-15, 2017, ExCeL, London
All Upcoming Live Events
Flash Poll
Video
Wilhelm Nehring, CEO of ThyssenKrupp Elevator UK, talks through his favorite applications of IoT in buildings and cities with IoT World News.
David Holecek, Director of Connected Products & Services at Volvo Car Group , speaks with IoT World News on Volvo's moves in the connected car ...
Liat Ben-Zur, SVP and digital technology leader at Philips, describes the plethora of ways IoT will be used to transform healthcare via hospitals, ...
Richard Corbridge, CIO at Health Service Executive, explains how IoT is already impacting digital healthcare in Ireland and where he sees the ...
Mimmis Cleeren, Global Director of marketing (IoT BU) at MediaTek, covers some of the special IoT projects that have emerged from MediaTek's ...
All Videos
Information Resources
All resources
Twitter Feed
like us on facebook
IoT World News
About Us     Contact Us     Help     Register     Twitter     Facebook     RSS
Copyright © 2017 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Terms of Use
in partnership with