article thumbnail

MY TAKE: ‘Network Detection and Response’ emerges as an Internet of Things security stopgap

The Last Watchdog

Data collected by IoT devices will increasingly get ingested into cloud-centric networks where it will get crunched by virtual servers. I had a fascinating discussion about this with Sri Sundaralingam, vice president of cloud and security solutions at ExtraHop , a Seattle-based supplier of NDR technologies. We spoke at RSA 2020.

Internet 196
article thumbnail

How Will $1.9 Billion for Cybersecurity Protect American Infrastructure?

CyberSecurity Insiders

Section 40122: Energy Cybersense Program —The Secretary, in consultation with the Secretary of Homeland Security and the heads of other relevant Federal agencies, shall establish an Energy Cyber Sense program to test the cybersecurity of products and technologies intended for use in the energy sector, including in the bulk-power system.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What will 2023 bring in the realms of cybersecurity and privacy?

Thales Cloud Protection & Licensing

Data sovereignty hits the road. The concept of "data sovereignty" refers to both the legality of data collection and storage in accordance with local laws. Data is always in motion due to the global nature of most businesses, whose customers and partners may be situated anywhere in the world.

article thumbnail

Explaining User and Entity Behavior Analytics: Enhanced Cybersecurity Through UEBA

CyberSecurity Insiders

User and entity behavior analysis (UEBA) is a cybersecurity technology that helps organizations detect malicious attacks by highlighting anomalous behavior. The technology works by building a model of regular network behavior. billion market cap by 2026. What is UEBA?