Remove Architecture Remove IoT Remove Retail Remove Risk
article thumbnail

Key Developments in IoT Security

Thales Cloud Protection & Licensing

Key Developments in IoT Security. Remember the early days of the emergence of Internet of Things (IoT) devices? Vulnerabilities have been discovered in many of these IoT devices. Ellen has extensive experience in cybersecurity, and specifically, the understanding of IoT risk. Thu, 07/15/2021 - 10:09.

IoT 100
article thumbnail

Retail has a multi-cloud problem…with sensitive data

Thales Cloud Protection & Licensing

Digital transformation (DX) is fundamentally impacting all aspects of the economy across every industry, and nowhere is this truer than in retail. But DX also introduces the potential to put sensitive customer and corporate data at risk by fundamentally changing where data needs to be protected and how it needs to be secured.

Retail 54
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

What’s driving the security of IoT? Imagine a world where the retail value of your car actually grows over time – that’s now becoming a reality. The problem becomes – how do we make sure we’re securing these “driving data centers” against the risks and threats that lurk on the Internet? Guest Blog: TalkingTrust.

IoT 77
article thumbnail

Introducing next-generation firewall from Palo Alto Networks to support 5G-enabled IoT, OT and IT use cases

CyberSecurity Insiders

Digital transformation realized through new 5G-enabled IoT, Operational Technologies (OT) and IT use cases are no exception. And these use cases can span many industries – manufacturing, public sector, healthcare, education, stadiums, retail and more. Or, an IoT device becomes subject to a supply chain attack.

article thumbnail

How to make sure your digital transformation is secure

CyberSecurity Insiders

Technologies such as IoT, cloud computing, edge computing, and AI have the ability to drastically improve the service and operations of any business. A sound cybersecurity architecture requires a strong foundation in order to anchor the keys and passwords embedded in our digital networks in place – this approach is called security-by-design.

article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

It seems everything smart is hackable, with IoT startups sometimes repeating security mistakes first made decades ago. The next day I cut the string, There's a parallel here to IoT light bulbs that change colors. And what then are the tools and knowledge that you need to get started hacking IoT devices. Funny thing.

IoT 52
article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

It seems everything smart is hackable, with IoT startups sometimes repeating security mistakes first made decades ago. The next day I cut the string, There's a parallel here to IoT light bulbs that change colors. And what then are the tools and knowledge that you need to get started hacking IoT devices. Funny thing.

IoT 52