Remove Architecture Remove CSO Remove Cybersecurity Remove IoT
article thumbnail

Episode 251: Kry10 CEO Boyd Multerer on building a secure OS for the IoT

The Security Ledger

The post Episode 251: Kry10 CEO Boyd Multerer on building a secure OS for the IoT appeared first on The Security Ledger with Paul F. Related Stories Episode 250: Window Snyder of Thistle on Making IoT Security Easy Forget the IoT. billion active IoT endpoints. Click the icon below to listen.

IoT 52
article thumbnail

2022 Cybersecurity predictions

CyberSecurity Insiders

In 2020, we saw cybersecurity move from a technical problem to become a business enabler. Data from the current AT&T Cybersecurity Insights Report shows that 5G technology is being driven by the line of business and has been siloed between IT and OT organizations. The report will be published in January 2022.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Machine Identities Can Imperil Enterprise Security

eSecurity Planet

Managing machine identities has never been more critical to an enterprise’s cybersecurity. Machine identities now outnumber humans in enterprises, according to Nathanael Coffing, co-founder and CSO of Cloudentity. The rise of automation and the IoT have resulted in enterprises unintentionally expanding their attack surface.

IoT 110
article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

Each year, a select pool of experts from the cybersecurity community sets hours aside to review hundreds of entries received for the SC Trust and Excellence Awards. Dan Basile is the chief information security officer for the RELLIS campus at the Texas A&M University System and director of Statewide Cybersecurity Services.

article thumbnail

Theme of Cooperation Resounds at 10th Annual Denver Conference

SecureWorld News

His morning keynote was all about cooperation—the state cooperating with municipalities and counties; working side-by-side with federal agencies; and involving law enforcement agencies from all levels when it comes to cybersecurity. Exploring Moral Injury in Cybersecurity." And don't forget the private sector.

CISO 77