article thumbnail

What’s new in IoT in ’22?

CyberSecurity Insiders

But, the IoT has also been a bright spot with eHealth becoming a crucial part of day-to-day life for many, plus EVs, smart energy and cybersecurity topping headlines. This time last year, we asked for your predictions for the coming year and we’re keeping that tradition alive with the 2022 IoT prediction survey. What’s your IoT vision?

IoT 87
article thumbnail

What’s new in IoT in ’22?

CyberSecurity Insiders

But, the IoT has also been a bright spot with eHealth becoming a crucial part of day-to-day life for many, plus EVs, smart energy and cybersecurity topping headlines. This time last year, we asked for your predictions for the coming year and we’re keeping that tradition alive with the 2022 IoT prediction survey. What’s your IoT vision?

IoT 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Editor’s note: I recently had the chance to participate in a discussion about the overall state of privacy and cybersecurity with Erin Kapczynski, OneRep’s senior vice president of B2B marketing. How can companies minimize risks? Regular training and simulations can help reduce risks associated with human errors.

article thumbnail

Cloudastructure: 2021 – Year to Date Review

CyberSecurity Insiders

Since that time, Cloudastructure has made significant investments in advancing the engineering of the solution, while hiring sales, marketing, PR and compliance staff for the first time to build brand awareness and engage with B2B customers across a wide range of markets.

article thumbnail

BrandPost: The Journey to Zero Trust

CSO Magazine

Mapping business goals to the cyber threats putting those goals at risk will help formulate the Zero Trust strategy to mitigate that risk. The policy will incorporate the trust and risk elements in its composition and adjust access authorizations accordingly. Will you only be implementing a software-defined perimeter?

article thumbnail

Spotlight on Cybersecurity Leaders: Dr. Cheryl Cooper

SecureWorld News

Dr. Cooper works as a Senior Security Design Engineer and Risk Manager with T-Mobile Corporation and is an adjunct professor teaching course curriculum under cybersecurity degree programs with the University of Wisconsin and University of New York. In this installment, we introduce you to Dr. Cheryl Cooper.

article thumbnail

McAfee Enterprise & FireEye 2022 Threat Predictions

McAfee

5G and IoT traffic between API services and apps will make them increasingly lucrative targets. Threat actors pay attention to enterprise statistics and trends, identifying services and applications offering increased risk potential. The following are some of the key risks that we see evolving in the future: 1. By Arnab Roy.