How to conduct an IoT pen test
Penetration testing was much like taking a battering ram to the door of the fortress. Keep pounding away and maybe find a secret backdoor to enter through. But what happens if pieces of the network are outside of the fortress? With the flurry of Internet of Things devices, is it harder to conduct a pen test with that many devices and end points?Claud Xiao, principal security researcher, Unit 42 at Palo Alto Networks, said for just testing some network services on IoT devices in a black box way, the difficulty level and the steps are similar with regular pen testing. But if you're discovering vulnerabilities via analyzing firmware or via analyzing wireless communications (e.g., Bluetooth or ZigBee), that's much harder.To read this article in full or to leave a comment, please click here
“We need network architects to think like software architects.”
The service is available on AWS and will soon expand to other public clouds.
Its new CEO comes from EarthLink, where he led the company's acquisition by Windstream.
The move reflects the growing demand for software-defined storage.

Providers like Telefonica rely on the product to maintain network visibility.
The updates will integrate functions across various enterprise-focused platforms.