Endpoint Security , Internet of Things Security , Open XDR
Countering Attacks That Leverage IoT
Eddie Doyle of Checkpoint Software on Mitigation StrategiesHow are cybercrime syndicates launching attacks that leverage IoT devices? Eddie Doyle of Check Point Software Technologies offers insights on the latest attack strategies and how to counter them.
See Also: OnDemand I IoT infrastructure and Retail Operations Fireside Chat I AMPOL
In a video interview at Information Security Media Group's recent Breach Prevention Summit in Washington, Doyle discusses:
- How high-tech cybercriminals are making hacking easy for low-tech criminals;
- Why protecting IoT devices from hacking is a significant challenge;
- What organizations can do to protect themselves.
Doyle is a global security strategist at Check Point Software Technologies. He is responsible for articulating the company's threat mitigation products and services to the marketplace.