Remove CISO Remove Data privacy Remove IoT Remove Technology
article thumbnail

Key Cybersecurity Trends for 2024: My Predictions

Jane Frankland

These include the adoption of hyper automation and artificial intelligence (AI)-driven decision making, where organisations will increasingly use automation technologies and artificial intelligence to streamline processes and enhance efficiency. IOT attacks aren’t showing any signs of slowing.

article thumbnail

Why digital certificates are critical to 5G security

The Security Ledger

Related Stories The Future of IoT Security Standards What CISOs Can Do to Win the Ransomware Game Episode 241: If Its Smart, Its Vulnerable a Conversation with Mikko Hyppönen. Digital certificates are critical to that, writes Alexa Tahan of Nokia.

CISO 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Outlook 2022: Third-party, Ransomware and AI Attacks Will Get Worse

eSecurity Planet

Ransomware has already been combined with distributed denial-of-service (DDoS) attacks , and Manky notes that ransomware could see the addition of wiper malware, “which could not only wreck data but destroy systems and hardware. … This could be a concern for emerging edge environments, critical infrastructure, and supply chains.”

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

According to thought leaders, the compromise of video data could result in intellectual property theft, physical security threats, privacy violations, extortion and perhaps regulatory punishment. All sensitive data should only be stored for the amount of time required and in accordance with any data privacy policies,” said Smith.

article thumbnail

Annual Reports: How They Warn of Cyber Risk

SecureWorld News

These are the very impacts we regularly hear CISOs mention on SecureWorld webcasts. federal and state laws governing the protection of privacy, health or other personally identifiable information and data privacy and cybersecurity laws in other regions. That's where the fine print comes in.

article thumbnail

Top 18 Cybersecurity Startups to Watch in 2021

eSecurity Planet

As attack methodologies evolve due to AI, machine learning and nation-state hackers , security startups are receiving a lot of funding to develop products that can secure application access for remote workers , provide real-time visibility into cyber attacks and protect data as it travels from the cloud to IoT devices.

article thumbnail

Redesigning the Security Narrative

Duo's Security Blog

As I immersed myself in foreign concepts around the information security industry, marketing, and business practices at scale, I grew to appreciate not just the technology we were building at Duo, but the people who built it, the diverse audiences that we addressed, and the unique problems-to-solve around security at large.