Register to receive our newsletter and join in the conversation on our message boards!
REGISTER NOW
Comments
Newest First | Oldest First | Threaded View
faryl
faryl
1/27/2017 8:11:00 PM
User Rank
IoT Visionary
Re: m3h
J0nny's breakdown makes me want to hack into my own kitchen appliances and put them to good use accruing Bitcoin instead lounging around on my counter all day though!

50%
50%
faryl
faryl
1/27/2017 8:07:08 PM
User Rank
IoT Visionary
Re: Vulnerability Scanner
Agreed. I feel like the service could be best summed up as "it's a start".

50%
50%
freehe
freehe
1/23/2017 1:46:30 PM
User Rank
IoT Visionary
Vulnerability Scanner
This is a great option for companies that have little to no detection measures but to be truly protected you need a comprehensive solution.

No onesize-fits-all works for this vulnerability scanner.

 

50%
50%
freehe
freehe
1/23/2017 1:45:10 PM
User Rank
IoT Visionary
Re: m3h
@j0nnyf1v3, excellent points.

50%
50%
dcawrey
dcawrey
1/14/2017 9:57:05 PM
User Rank
IoT Visionary
Re: m3h
I keep harping IoT needs more visibility. This could be a great option for some organizations. These types of tools will allow systems to keep up with threats that are going to hit IoT. It's inevitable. 

50%
50%
afwriter
afwriter
1/13/2017 11:42:20 PM
User Rank
IoT Visionary
Re: m3h
I was all excited about this until I ready J0nny's breakdown. Though he doesn't paint that great of a picture, BeyondTrust's vulnerability scanner is still something. In a time when we need more cyber security these kinds of announcements give me hope that we are at least moving in the right direction.

50%
50%
j0nnyf1v3
j0nnyf1v3
1/12/2017 9:16:48 AM
User Rank
IoT Novice
m3h
I have had the privilege of testing many different vulnerability scanners and solutions for testing and mitigation, and this is something that will just scare the user who signs up for a free trial(yay, marketing)... Being that IoT is and has been a part of networks since device A could talk to device B of a different type, marketers are getting clever with their stale, clean-hashed unreleased, and are slapping the newest "Pitbull Label" – as I call it – on it and selling it as a new solution to an old problem with a new name.. Sorry so say it.

Although I cannot say that I told the truth on the registration, because...come on... Seriously, I have used this one actually, just to see how it was different.  And for one, you have to install it... For real researchers or hackers, they want a portable version, or non persistent... And with Bullguard you can do that. Or an IT professional could use cloud searches such as Shodan. If you go all out with Kali, Arch, Pentoo, Santoku, you have it all and you can keep it persist or non-persist.... Or make the machine remember what you did, or retain no RAM. And I don't know about the normal advanced researchers, but if I am securing a network, I do NOT want a 3rd party solution that calls home in order to function. Clever .py and some shodan will do all you need. I want to be the only one that knows my vulns... kthx!

If you are one of the "set and forget" types the marketing mentions, then this is for you. Because it will scare you into action. But beyond telling you what a normal scanner does, with certain GUI emphasis on IoT aka Wireless, Bluetooth, and (InsertNameHere)Cast. And it is geared as of now with special focus on only DDoS, which to me is old news already. I don't want to shut you down by accessing your coffee maker, I want to bypass your DmZ via XXXXXx(shhh), access root on your coffee maker, drop a shell, traverse your network, find your DC'S, DNS, Exchange, Storage, Sit and #CampWithAWP where obj.AWP::T43mp01s0nD4t43ncry.py( ); then set back on the beach with my trusty VPN's watching the troves of bitcoin hypothetically stack to the virtual celing.. Or watch my dump ftp's drip-fill with fresh boolened IP. Enterprises are, in all honesty, focused on the wound that can take a band-aid and heal. Not the cancerous holes that lie deep within the networks of connected devices that leave the "barn door wide open" if chained together just so... DDoS... Hurts for a little... Root... Forces forfeit....

 

 j5

50%
50%


Latest Articles
In Gothenburg more so than other burgeoning smart cities, silos are seen as the enemy. And no one knows this better than Ann-Louise Hohlfält, urban development officer for the City of Gothenburg.
Virtual reality and augmented reality remain nascent technologies, but Mastercard is already working on its plans to leverage them as they anticipate mass adoption among consumers.
We speak with Rinat Guy, CIO for the Municipality of Israel's award-winning smart city.
Industrial internet leader Bosch tells us about the IoT power tool products their working on & how long until these solutions hit the mass-market.
Our interview with Boeing Senior Systems Engineer Robert Rencher reveals that aviation IoT has implications for digital factories and supply chains, but its the operational environment where the biggest inroads will be made.
Upcoming Live Events
May 16-18, 2017, Santa Clara Convention Center
May 16-18, 2017, Santa Clara Convention Center
May 16-18, 2017, Millennium Gloucester Hotel, London
June 13-15, 2017, ExCeL, London
June 13-15, 2017, ExCeL, London
All Upcoming Live Events
Flash Poll
Video
Wilhelm Nehring, CEO of ThyssenKrupp Elevator UK, talks through his favorite applications of IoT in buildings and cities with IoT World News.
David Holecek, Director of Connected Products & Services at Volvo Car Group , speaks with IoT World News on Volvo's moves in the connected car ...
Liat Ben-Zur, SVP and digital technology leader at Philips, describes the plethora of ways IoT will be used to transform healthcare via hospitals, ...
Richard Corbridge, CIO at Health Service Executive, explains how IoT is already impacting digital healthcare in Ireland and where he sees the ...
Mimmis Cleeren, Global Director of marketing (IoT BU) at MediaTek, covers some of the special IoT projects that have emerged from MediaTek's ...
All Videos
Webinars
ARCHIVED
Tuesday, March 14, 2017
1:00 p.m. EST

Identifying and solving the practical security challenges encountered by businesses embarking on an Internet of Things deployment.

Realizing your company's IoT vision starts with connecting and securing your infrastructure. IoT infrastructures require organizations to collect and transmit commands and data from devices, applications and people -- securing all of this is a sizeable challenge.

Our expert panelists will identify and solve the key issues that arise during this process, enabling a safe and steady beginning to your organization's IoT journey.

The webinar will cover:

  • Identity Issuance: Security at Scale
  • Identity Management: Authentication and Authorization
  • Identity and Data Security: Data Integrity and Granular Policy Definition

Webinar attendees will learn:

  • How to ensure that data is only accessed by authorized devices, applications and users in an IoT setting
  • Methods for transmitting data from devices in the field to value engines securely and efficiently
  • Best practice for implementing tried-and-trusted IoT ecosystems and safeguarding data flow across your company's entire infrastructure
  • How to create a holistic and protected IoT ecosystem for your company

Information Resources
All resources
Twitter Feed
like us on facebook
IoT World News
About Us     Contact Us     Help     Register     Twitter     Facebook     RSS
Copyright © 2017 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Terms of Use
in partnership with