The Cloud Security Alliance has created a new working group to focus on the examination of incident handling and forensics in the cloud environment. In its first white paper, Mapping the Forensic Standard ISO/IEC 27037 to Cloud Computing, the group aims to help practitioners define standardized processes for conducting forensic investigations.
At least 70 percent of devices that make up the Internet of Things (IoT) are vulnerable to attack, according to a report from Hewlett-Packard’s security unit Fortify, released in July. The study analyzed a range of IoT devices, from remote power outlets to home alarms and even sprinkler controllers. According to the study, vulnerabilities include weak passwords, insecure password recovery mechanisms, and poorly protected credentials.