• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Network Security

Researchers Hope This Bug-Mining Tool Will Combat Network Vulnerabilities

Red Balloon’s “n-days” tool aims to find network vulnerabilities and improve them before hackers attempt a digital break in.

February 7, 2018 Jessica Messier Leave a Comment

Training and testing is vital to mitigating human error when it comes to cyber security.

According to Wired, researchers are studying the Internet of Things (IoT) threat-scanning tool belonging to security company Red Balloon, to see how it performs on the building control systems of Plum Island Animal Disease Center. If the tool performs well, the project could provide “a critical tool in the fight against vulnerabilities in embedded industrial systems and critical infrastructure,” such as networks.

Red Balloon’s tool searches or “mines” for “n-days” in IoT devices – vulnerabilities that have not yet been detected in certain products. The research supporting this tool is helping to automate the process of developing the code that would show vulnerabilities, as well as pinpoint evidence that attackers might use these techniques to hack into the system. If the research pans out and the tool works, it will speed up the process of identifying and patching holes quickly, and sway hackers from putting in the effort to commit a digital break in.

The project on Red Balloon stems from the growing “sorry state of IoT security,” Wired says. Many common household items, such as T.Vs, routers and electric toothbrushes crunch data and gain internet connectivity. However, these devices aren’t built with a plan for how to patch vulnerabilities once they are discovered by hackers. Making matters more difficult is that many devices are “black boxes full of unknown hardware components and proprietary software implementations,” which complicates bug detection.

What decision makers need to know:

While Red Balloon’s work is promising, Wired reports that it’s still not ready, among other research aiming to detect bugs early in IoT products. This means that companies and institutions need to be aware of the risks and vulnerabilities that might live in their own networks, and stay on top of cyber security policies and procedures. There is already a “real security crises, most recently Krack, which left basically every connected device exposed,” Wired says. Being able to stay ahead of hacking trends – phishing, viruses, etc. – can help companies and institutions stay out of hot water, and keep data protected. Patching security holes after a data breach might help restore some security, but are often too late, and result in crucial damage in data and employees’ security.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Cyber Attacks, Cyber Security

Related Content:

  • Cybersecurity and information or network protection. Future technology web services for business and internet project CrowdStrike Cyber Armageddon: How Do Firms Now Build…
  • DDoS, NETSCOUT Arbor Insight 7 Layers of DDoS Attacks and How To…
  • cisco webex-rooms-modern-space AVI-SPL Receives Cisco 2023 Reimagine Workspaces Partner of…
  • data breach Nearly 900 Schools Impacted by National Student Clearinghouse…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.