Actus How to Solve IoT’s Identity Problem 1 min read Network protocols can be used to identify operating systems and discern other device information. See author's posts Continue Reading Previous: Adaptive Access Technologies Gaining Traction for Security, AgilityNext: Elastic Expands Cloud Security Capabilities for AWS Related Stories Banking malware Grandoreiro returns after police disruption 1 min read Actus Banking malware Grandoreiro returns after police disruption Ransomware gang targets Windows admins via PuTTy, WinSCP malvertising 1 min read Actus Ransomware gang targets Windows admins via PuTTy, WinSCP malvertising Android malware Grandoreiro returns after police disruption 1 min read Actus Android malware Grandoreiro returns after police disruption