Countering Attacks That Leverage IoTEddie Doyle of Checkpoint Software on Mitigation Strategies
How are cybercrime syndicates launching attacks that leverage IoT devices? Eddie Doyle of Check Point Software Technologies offers insights on the latest attack strategies and how to counter them.
See Also: Come Clean With Your Cyber Hygiene
In a video interview at Information Security Media Group's recent Breach Prevention Summit in Washington, Doyle discusses:
- How high-tech cybercriminals are making hacking easy for low-tech criminals;
- Why protecting IoT devices from hacking is a significant challenge;
- What organizations can do to protect themselves.
Doyle is a global security strategist at Check Point Software Technologies. He is responsible for articulating the company's threat mitigation products and services to the marketplace.