Remove 2018 Remove Data privacy Remove IoT Remove Technology
article thumbnail

2020 Predictions: New Challenges for Data Privacy and the 5G Hackathon

Thales Cloud Protection & Licensing

Today’s innovations and technologies provide tremendous opportunities for enterprises. Along with innovation and technology proliferation, new challenges that will shape business during 2020. The importance of data and the power of being an insights-driven enterprise are increasing the amount of damage that data breaches can cause.

article thumbnail

5 IoT Security Predictions for 2019

Security Affairs

2018 was the year of the Internet of Things (IoT), massive attacks and various botnets hit smart devices, These are 5 IoT Security Predictions for 2019. IoT Attacks in 2018. Do the increased attacks mean the industry is becoming accustomed to IoT cyber attacks? Three IoT Attack Avenues for 2019.

IoT 89
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A look back on 2018: What was hype and what was, perhaps, underrated

Thales Cloud Protection & Licensing

As we close in on the final few days of the year and look ahead to the clean slate that 2019 represents, I wanted to take a few moments to reflect on 2018 – specifically, what tech innovations and predictions held true, which fell a bit flat and which were entirely unexpected. IoT in Everything. Assume IoT Security Vulnerabilities.

IoT 70
article thumbnail

2018 Thales Data Threat Report, Global Edition: Digital Transformation & Data Security

Thales Cloud Protection & Licensing

This morning we announced, in tandem with our partner 451 Research, the Global Edition of the 2018 Thales Data Threat Report. It’s abundantly clear that medium to larger enterprises (the focus of the report and underlying survey) are finding it harder than ever to protect their sensitive data. Big Data – 99%.

article thumbnail

The Essential Guide to Radio Frequency Penetration Testing

Pen Test

Its primary goal is to meticulously identify vulnerabilities inherent within wireless communication systems (Smith & Johnson, 2018). In contemporary times, with the exponential growth of the Internet of Things (IoT), smart homes, connected cars, and wearable devices, the importance of RF pentesting has soared significantly.

article thumbnail

California Cybersecurity Laws: A Beginners Guide

SiteLock

As the home of some of the biggest names in technology, it’s no surprise that California’s legislators are especially concerned about cybersecurity. In 2018 alone, California has passed several laws that they hope will inspire other states – and ultimately, Congress – to passing cybersecurity laws that better address the issues of our time.

article thumbnail

Podcast Episode 128: Do Security and Privacy have a Booth at CES?

The Security Ledger

And do security and privacy have a seat at the table at the world's largest electronics event? We sit down with IoT luminary and. Podcast 127: Donnie, Talk to China and Other Lessons from 2018. And do security and privacy have a seat at the table at the world’s largest electronics event? Read the whole entry. »