Remove Architecture Remove CISO Remove IoT Remove Risk
article thumbnail

Firms with exposed IoT have a higher concentration of other security problems

SC Magazine

Exposed enterprise IoT devices can be an indicator of security issues to come, with firms sporting exposed devices having a 62% higher density of other security problems, new research shows. Is it surprising that there’s a correlation between something like IoT exposure and other security issues? Well, a lot of things went wrong.

IoT 98
article thumbnail

A Reactive Cybersecurity Strategy Is No Strategy at All

CyberSecurity Insiders

A foundational approach to cybersecurity empowers CISOs to see abnormalities and block threats before they do damage. But what are your options for proactive protection when the notion of a walled-in network has been shattered by the proliferation of new IoT devices, growth of cloud services, and new hybrid work from home models?

DNS 140
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

“Future of Vulnerability Management” Podcast Episode 6: The Role Vulnerability Management Plays in Proper Cyber Hygiene

NopSec

Over the past two decades, Lisa has advised Fortune 500 enterprises on data security, privacy and technology risk management, and led many diverse teams at Ally Financial (GMAC), KPMG, and Blue Cross Blue Shield. In this episode, Lisa talks with Tim Brown, the CISO at SolarWinds.

article thumbnail

How to build a zero trust ecosystem

SC Magazine

With its tailored controls, micro-perimeters and trust-nothing approach to access, Zero Trust gives CISOs confidence that their security program can secure their remote workforce and meet regulatory compliance requirements. Thanks to a rapid shift to remote work, Zero Trust is finally garnering the attention it deserves. What is Zero Trust?

CISO 134
article thumbnail

IoT Devices a Huge Risk to Enterprises

eSecurity Planet

When millions of people around the world were sent home to work at the onset of the global COVD-19 pandemic, they left behind not only empty offices but also a host of Internet of Things (IoT) devices – from smartwatches to networked printers – that were still connected to corporate networks and cranking away.

IoT 145
article thumbnail

AT&T Business Summit is virtual Oct. 27-28 and free!

CyberSecurity Insiders

Description: PERSPECTIVE: Many companies embrace mobile, video, cloud, and IoT technologies to stay competitive and relevant amidst ever-growing demands from customers and partners. Challenges born from neither securing nor understanding your supply chain represent enormous risks to your business, your brand, and your customers.

article thumbnail

Strong medical device security awareness stifled by inventory, knowledge gaps

SC Magazine

In fact, the latest Armis report shows 63% of health care delivery organizations have been impacted by a security incident caused by unmanaged devices or IoT in the last two years. But even advanced tools can’t tell you who owns it – or what it means to the organization in terms of risk.”.