article thumbnail

How Can Cybersecurity Professionals Account for Vulnerabilities in Fleet Data?

The State of Security

Telematics systems, connected cars, and similar IoT systems provide fleet managers with a wealth of information, but this connectivity also raises security concerns. As data breach costs reach their highest point in decades, accounting for vulnerabilities in organizations’ data becomes increasingly crucial.

article thumbnail

MY TAKE: Why companies and consumers must collaborate to stop the plundering of IoT systems

The Last Watchdog

The Internet of Things (IoT) has come a long, long way since precocious students at Carnegie Melon University installed micro-switches inside of a Coca-Cola vending machine so they could remotely check on the temperature and availability of their favorite beverages. Related: Companies sustain damage from IoT attacks That was back in 1982.

IoT 279
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Integrating GRC with Emerging Technologies: AI and IoT

SecureWorld News

Other aspects include: • Resource management • Transparent processes for sharing information • Ethics and accountability policies • Conflict resolution policies Risk (management) A business is subject to various elements of risk from many different angles, including legal, financial, security, and strategic risks.

IoT 81
article thumbnail

USENIX Security ’23 – ‘“It’s The Equivalent of Feeling Like You’re In Jail”: Lessons From Firsthand & Secondhand Accounts Of IoT-Enabled Intimate Partner Abuse’

Security Boulevard

Permalink The post USENIX Security ’23 – ‘“It’s The Equivalent of Feeling Like You’re In Jail”: Lessons From Firsthand & Secondhand Accounts Of IoT-Enabled Intimate Partner Abuse’ appeared first on Security Boulevard.

IoT 62
article thumbnail

U.S. to Launch Cybersecurity Certification for Consumer IoT Devices

SecureWorld News

Federal Communications Commission (FCC) have unveiled a new cybersecurity certification and labeling program aimed at enhancing the security of connected devices. By applying the program's shield logo to certified devices, consumers will be able to identify and choose products that meet the program's cybersecurity guidelines.

IoT 84
article thumbnail

GAO warns government agencies: focus on IoT and OT within critical infrastructure

CSO Magazine

The US Government Accounting Office (GAO) continues to highlight shortcomings in the cybersecurity posture of government entities responsible for the protection of United States infrastructure when it comes to internet of things (IoT) and operational technology (OT) devices and systems.

IoT 99
article thumbnail

How Can Cybersecurity Professionals Account for Vulnerabilities in Fleet Data?

Security Boulevard

Telematics systems, connected cars, and similar IoT systems provide fleet managers with a wealth of information, but this connectivity also raises security concerns. As data breach costs reach their highest point in decades, accounting for vulnerabilities in organizations’ data becomes increasingly crucial.