Remove Accountability Remove CISO Remove Data collection Remove Encryption
article thumbnail

IoT Devices a Huge Risk to Enterprises

eSecurity Planet

. “For more than a year, most corporate offices have stood mostly abandoned as employees continued to work remotely during the COVID-19 pandemic,” Deepen Desai, chief information security officer (CISO) at Zscaler, said in a statement. Enterprises accounted for 28 percent, followed by healthcare devices at 8 percent.

IoT 145
article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

.” “It would be possible, on detailed examination of video, to compromise elements of operational security,” agreed Mike Hamilton, co-founder and chief information security officer of CI Security and former Seattle CISO. Thought leaders advise reducing or eliminating the use of these skeleton key-like accounts.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The first anniversary of the GDPR: How a risk-based approach can help you achieve GDPR compliance

Thales Cloud Protection & Licensing

The GDPR applies to businesses that collect and use personal information from citizens of the EU, regardless of where the business itself is located. The GDPR mandates that a business must inform EU DPAs very quickly (within 72 hours) and thoroughly of any security data breach involving European citizens.

Risk 97
article thumbnail

CSTA Turns 400 – Proof That Technology Integrations Is Exactly What You Are Looking For

Cisco Security

Best of all, there is no incremental cost based on the volume of data collected. Cyber Observer’s partnership with Cisco enables CISOs to manage and monitor their cybersecurity eco-system posture. Data includes RF Device location information, RF Device packet information, RF Network connectivity. Read more here.

article thumbnail

Top 18 Cybersecurity Startups to Watch in 2021

eSecurity Planet

The two-tier program includes business development opportunities, training, joint marketing, partner collateral, marketing co-op funds, sales leads and field account planning. Randori hired big names in security in 2020, including former Qualys VP of Engineering Ken Shelton, hacker Aaron Portnoy and veteran CISO Aaron Fodisck.

article thumbnail

The Hacker Mind Podcast: Crimeware As A Service

ForAllSecure

With ransomware, attackers encrypt an organization's data and hold it hostage until a ransom is paid. Once attackers receive payment, they are supposed to share a decryption key, enabling victims to recover their data. And when you think of an API at attack, where that data is just exfiltrated. Ransomware is not new.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Beyond Identity Identity management 2020 Private Expel Managed security service 2016 Private Tigera Zero trust for K8s 2016 Private Intrinsic Application security 2016 Acquired: VMware HackerOne Penetration testing 2015 Private Virtru Data encryption 2014 Private Cloudflare Cloud infrastructure 2010 NYSE: NET.