Remove 2020 Remove Artificial Intelligence Remove IoT
article thumbnail

MY TAKE: Why companies and consumers must collaborate to stop the plundering of IoT systems

The Last Watchdog

The Internet of Things (IoT) has come a long, long way since precocious students at Carnegie Melon University installed micro-switches inside of a Coca-Cola vending machine so they could remotely check on the temperature and availability of their favorite beverages. Related: Companies sustain damage from IoT attacks That was back in 1982.

IoT 279
article thumbnail

How Has CAP Certification Evolved to Lead in Risk Management?

CyberSecurity Insiders

As the needs in cyber risk management change, so must the credentials that support them.

Risk 126
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Why monetizing data lakes will require applying ‘attribute-based’ access rules to encryption

The Last Watchdog

The amount of data in the world topped an astounding 59 zetabytes in 2020, much of it pooling in data lakes. We’ve barely scratched the surface of applying artificial intelligence and advanced data analytics to the raw data collecting in these gargantuan cloud-storage structures erected by Amazon, Microsoft and Google.

article thumbnail

ENISA – The need for Incident Response Capabilities in the health sector

Security Affairs

In 2020, the number of reports sent to ENISA about cybersecurity incidents saw an increase of 47% compared to the previous year. The level of exposure to cyber threats is increasing to the adoption of emerging technologies such as the Internet of Things (IoT), Artificial Intelligence (AI), big data, and cloud computing.

article thumbnail

Finalists: Best Emerging Technology

SC Magazine

CONTINUOUS ATTACK SURFACE TESTING Company: Bishop Fox Notable: Introduced in February 2020, the platform uncovers an organization’s digital footprint, identifying vulnerabilities in more categories that are undetectable by current commercial scanners and maintaining a detailed map of the entire attack surface.

article thumbnail

From a tech explosion to accidental cyberattacks, researchers offer a glimpse into 2030

SC Magazine

Attendees and workers chat beneath a ‘5G’ logo at the Quectel booth at CES 2020, January 8, 2020. The project is based on work Baines did for Europol’s Cyber Crimes Center, Project 2020, which made a similar series of predictions in 2013 targeting last year. Photo by Mario Tama/Getty Images).

article thumbnail

Cybersecurity threats: what awaits us in 2023?

SecureList

And IT teams should be prepared to deal with evolving threats posed by emerging technologies which are becoming widespread, such as geo-targeted phishing or attacks related to Cloud Security, IOT and AI. Finland’s Vastamoo in 2020 & Australia’s Medibank in 2022), as well as highly private personal data (ex.