article thumbnail

Firms with exposed IoT have a higher concentration of other security problems

SC Magazine

Exposed enterprise IoT devices can be an indicator of security issues to come, with firms sporting exposed devices having a 62% higher density of other security problems, new research shows. Is it surprising that there’s a correlation between something like IoT exposure and other security issues? Well, a lot of things went wrong.

IoT 98
article thumbnail

A Reactive Cybersecurity Strategy Is No Strategy at All

CyberSecurity Insiders

A foundational approach to cybersecurity empowers CISOs to see abnormalities and block threats before they do damage. But what are your options for proactive protection when the notion of a walled-in network has been shattered by the proliferation of new IoT devices, growth of cloud services, and new hybrid work from home models?

DNS 140
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

“Future of Vulnerability Management” Podcast Episode 6: The Role Vulnerability Management Plays in Proper Cyber Hygiene

NopSec

In this episode, Lisa talks with Tim Brown, the CISO at SolarWinds. Tim drives the creation, architecture, strategy, and external visibility for products and solutions. Tim has held many roles in the cybersecurity space, including Fellow, Chief Architect, Distinguished Engineer and Board Advisor.

article thumbnail

How to build a zero trust ecosystem

SC Magazine

With its tailored controls, micro-perimeters and trust-nothing approach to access, Zero Trust gives CISOs confidence that their security program can secure their remote workforce and meet regulatory compliance requirements. Thanks to a rapid shift to remote work, Zero Trust is finally garnering the attention it deserves. What is Zero Trust?

CISO 134
article thumbnail

Executive Spotlight: Q&A with Chief Information Officer, Scott Howitt

McAfee

I found that I had a passion for information security and have been the CISO at two different Fortune 500 companies. I also believe blockchain will likely be a good solution for IoT identity and machine learning will take over for the SEIM. After being in the CISO role for over 12 years, I understand how difficult the role can be.

CISO 78
article thumbnail

2022 Cybersecurity predictions

CyberSecurity Insiders

While in past years, InfoSec was previously the focus and CISOs were the norm – we’re moving to a new cybersecurity world order that expands the role of the CISO to a CSO (Chief Security Officer). Manufacturing is a prime area for disruption with the increase in the number of IoT devices during the pandemic.

article thumbnail

IoT Devices a Huge Risk to Enterprises

eSecurity Planet

When millions of people around the world were sent home to work at the onset of the global COVD-19 pandemic, they left behind not only empty offices but also a host of Internet of Things (IoT) devices – from smartwatches to networked printers – that were still connected to corporate networks and cranking away.

IoT 141