
The Verkada IoT Security Camera Attack – How Did Hackers Get In?
04/14/21 • 5 min
IoT security camera provider Verkada was the target of a recent attack. Hackers gained access to the live video feeds of 150,000 surveillance cameras used by their customers. The attack showed the risks involved in leveraging IoT devices within business operations. In this short episode, find out what happened during the recent security breach, and what common practices can open the door to attacks like this.
IoT security camera provider Verkada was the target of a recent attack. Hackers gained access to the live video feeds of 150,000 surveillance cameras used by their customers. The attack showed the risks involved in leveraging IoT devices within business operations. In this short episode, find out what happened during the recent security breach, and what common practices can open the door to attacks like this.
Previous Episode

Improving Transportation System Operational Visibility and Security
The number of devices used in Intelligent Transportation Systems (ITSs) is exploding. Unfortunately, this high level of connectivity and network complexity has created an expanded attack surface with many vulnerabilities. Join us to learn about security challenges faced by metro systems, maritime transportation and logistics, and how to gain deeper operational visibility, prevent downtime and detect cyber threats.
Next Episode

How to Build an Effective OT/IoT Cybersecurity Risk & Compliance Program
U.S. regulators are looking into how business operators maintain effective cybersecurity. The incoming Security of Critical Infrastructure legislative amendments will no doubt lead to an increased security compliance regime for any country.
Companies everywhere should proactively develop a robust cybersecurity compliance program – not because of legislation but because it’s good security hygiene and practice. How can you prepare for that now?
Join with us as we explore:
- The steps involved in building out a Risk & Compliance Program
- Effective design, implementation and response components
- Building a quality ecosystem that supports identifying, managing and mitigating risks
- Gathering intelligence for making evidence-based decisions
- Ensuring your time and effort leads to a quality outcome
If you like this episode you’ll love
Episode Comments
Generate a badge
Get a badge for your website that links back to this episode
<a href="https://goodpods.com/podcasts/the-ot-and-iot-security-podcast-233714/the-verkada-iot-security-camera-attack-how-did-hackers-get-in-26217131"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to the verkada iot security camera attack – how did hackers get in? on goodpods" style="width: 225px" /> </a>
Copy