Remove B2B Remove Cyber Attacks Remove Internet Remove Technology
article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Editor’s note: I recently had the chance to participate in a discussion about the overall state of privacy and cybersecurity with Erin Kapczynski, OneRep’s senior vice president of B2B marketing. Byron: I was initially drawn to cybersecurity as a USA TODAY technology reporter assigned to cover Microsoft.

article thumbnail

What’s new in IoT in ’22?

CyberSecurity Insiders

The Internet of Things (IoT) was once considered solely applicable to the B2B world, with the promise of many consumer uses and the potential to transform industries. Today’s IoT is taking the place of the smartphone as the new “transformative” technology. With increased connections comes a higher risk of cyber-attacks.

IoT 87
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What’s new in IoT in ’22?

CyberSecurity Insiders

The Internet of Things (IoT) was once considered solely applicable to the B2B world, with the promise of many consumer uses and the potential to transform industries. Today’s IoT is taking the place of the smartphone as the new “transformative” technology. With increased connections comes a higher risk of cyber-attacks.

IoT 52
article thumbnail

Top 5 Attack Vectors to Look Out For in 2022

Security Affairs

Threat actors are continually looking for better ways to target organizations, here are the top five attack vectors to look out for in 2022. Malicious actors are continually looking for better ways to carry out successful cyber attacks. Remote Technology. Conclusion.

IoT 121
article thumbnail

Cybersecurity in the Evolving Threat Landscape

Security Affairs

As technology evolves and our dependence on digital systems increases, the cybersecurity threat landscape also rapidly changes, posing fresh challenges for organizations striving to protect their assets and data. One of the primary reasons why entities battle to stay ahead of emerging threats is the rapid pace of technological innovation.

article thumbnail

NEW TECH: ‘Passwordless authentication’ takes us closer to eliminating passwords as the weak link

The Last Watchdog

Compromised logins continue to facilitate cyber attacks at all levels, from phishing ruses to credential stuffing to enabling hackers to probe deep inside of a breached network. Username and password logins emerged as the go-to way to control access to network servers, business applications and Internet-delivered consumer services.

Passwords 164
article thumbnail

ROUNDTABLE: What happened in privacy and cybersecurity in 2021 — and what’s coming in 2022

The Last Watchdog

In 2021, we endured the fallout of a seemingly endless parade of privacy controversies and milestone cyber attacks. Last Watchdog sought commentary from technology thought leaders about lessons learned in 2021– and any guidance they might have to offer heading into 2022. Related: The dire need to security-proof APIs.