Remove Architecture Remove CISO Remove Information Security Remove IoT
article thumbnail

Firms with exposed IoT have a higher concentration of other security problems

SC Magazine

Exposed enterprise IoT devices can be an indicator of security issues to come, with firms sporting exposed devices having a 62% higher density of other security problems, new research shows. But what does that correlation mean for chief information security officers? The problems get worse from there.

IoT 98
article thumbnail

Executive Spotlight: Q&A with Chief Information Officer, Scott Howitt

McAfee

When I was a CIO, I learned that I really didn’t know much about information security, and it was hindering me in the CIO role. My next job was a director of information security at a financial services company, and I never looked back. Understanding user and device behavior and being able to spot anomalies is the future.

CISO 78
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Securing the Unsecured: State of Cybersecurity 2019 – Part I

McAfee

The biggest challenge is information security extension in a multi-cloud world. Yet few security operations teams are prepared for that. Machine learning will be throughout the information security technology stack soon. The harder thing here is that information security teams must adjust to ALL of this at ONCE.

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

Prior to Mastercard, Abdullah was the chief information security officer at Xerox, where she established and led a corporate-wide information risk management program. She also served as the deputy chief information officer of the White House. She is also the host of the Mastering Cyber podcast.

article thumbnail

IoT Devices a Huge Risk to Enterprises

eSecurity Planet

When millions of people around the world were sent home to work at the onset of the global COVD-19 pandemic, they left behind not only empty offices but also a host of Internet of Things (IoT) devices – from smartwatches to networked printers – that were still connected to corporate networks and cranking away.

IoT 145
article thumbnail

Strong medical device security awareness stifled by inventory, knowledge gaps

SC Magazine

However, the sector yet to meet necessary inventory and security measures to stymie this critical threat. In fact, the latest Armis report shows 63% of health care delivery organizations have been impacted by a security incident caused by unmanaged devices or IoT in the last two years.

article thumbnail

Android Debugging Tools Also Useful for Compromising Devices, Mining Cryptocurrency

Security Affairs

Once an open adb port is identified, the malware drops a stage 1 shell script onto the device which, when launched, downloads two additional (stage 2) shell scripts which then download the “next stage binary for several architectures and launch the corresponding one.” He is currently Global CISO for the ATCO Group of companies.