article thumbnail

Cybersecurity Insights with Contrast CISO David Lindner | 2/9/24

Security Boulevard

Insight #1 From toasters to toothbrushes , the Internet of Things (IoT) continues to wreak havoc on the internet. IoT manufacturers need to do better. The post Cybersecurity Insights with Contrast CISO David Lindner | 2/9/24 appeared first on Security Boulevard.

CISO 64
article thumbnail

Why digital certificates are critical to 5G security

The Security Ledger

Related Stories The Future of IoT Security Standards What CISOs Can Do to Win the Ransomware Game Episode 241: If Its Smart, Its Vulnerable a Conversation with Mikko Hyppönen. Digital certificates are critical to that, writes Alexa Tahan of Nokia.

CISO 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Outlook 2022: Third-party, Ransomware and AI Attacks Will Get Worse

eSecurity Planet

Ransomware has already been combined with distributed denial-of-service (DDoS) attacks , and Manky notes that ransomware could see the addition of wiper malware, “which could not only wreck data but destroy systems and hardware. … This could be a concern for emerging edge environments, critical infrastructure, and supply chains.”

article thumbnail

Annual Reports: How They Warn of Cyber Risk

SecureWorld News

The section on cyber risk is in bold: "We face legal, reputational and financial risks from any failure to protect client and/ or Accenture data from security incidents or cyberattacks.". These are the very impacts we regularly hear CISOs mention on SecureWorld webcasts. L egal, reputational and financial risks?

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

.” “It would be possible, on detailed examination of video, to compromise elements of operational security,” agreed Mike Hamilton, co-founder and chief information security officer of CI Security and former Seattle CISO. Long-term data storage is often a liability rather than an asset,” added Costlow.

article thumbnail

Top 18 Cybersecurity Startups to Watch in 2021

eSecurity Planet

As attack methodologies evolve due to AI, machine learning and nation-state hackers , security startups are receiving a lot of funding to develop products that can secure application access for remote workers , provide real-time visibility into cyber attacks and protect data as it travels from the cloud to IoT devices. SECURITI.ai.

article thumbnail

Key Cybersecurity Trends for 2024: My Predictions

Jane Frankland

The proliferation of IoT devices and sensors will accelerate, allowing organisations to collect and leverage data for improved operational efficiency and real-time monitoring. IOT attacks aren’t showing any signs of slowing. Compromising connected devices can lead to significant privacy breaches and disruptions.