Remove CISO Remove Information Security Remove IoT
article thumbnail

IATA Cyber Regulations

Centraleyes

Recent amendments have focused on addressing vulnerabilities linked to digital transformation in aviation, such as the use of cloud technologies and IoT devices. What Are the Requirements for IATA Cyber Security Regulations? are typically required to meet IATAs expectations.

Risk 52
article thumbnail

Spotlight on Cybersecurity Leaders: Richard Staynings

SecureWorld News

Richard is currently Chief Security Strategist for Cylera, a pioneer in the space of medical device and IoT security. I came into IT from the side as a consultant and worked my way through IT infrastructure management before transiting to information security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Is Exposure Management and Why Does It Matter?

Security Boulevard

Step 1: Know your attack surface Exposure management platforms discover and aggregate asset data across the entire external and internal attack surface, including cloud, IT, OT, IoT, identities and applications, providing a holistic view of the attack surface.

Risk 61
article thumbnail

2025 Cybersecurity Predictions: Not Getting Easier; But There is Hope

SecureWorld News

and its allies must keep up; GenAI; mobile threats; RaaS makes it easier for the bad actors; non-human identity management; OT, IoT, and IIoT security and threats; cyber resiliency; SOC models; and improving cybersecurity education and programming. Preparing for Q-Day in 2025 should be a top priority for CISOs for this very reason.

article thumbnail

Firms with exposed IoT have a higher concentration of other security problems

SC Magazine

Exposed enterprise IoT devices can be an indicator of security issues to come, with firms sporting exposed devices having a 62% higher density of other security problems, new research shows. But what does that correlation mean for chief information security officers? The problems get worse from there.

IoT 98
article thumbnail

Spotlight: Your IoT Risk Is Bigger Than You Think. (And What To Do About It.)

The Security Ledger

In this Spotlight edition of the podcast, we’re joined by Curtis Simpson, the Chief Information Security Officer at Armis. IoT and OT (operation technology) deployments are growing and pose challenges to organizations that are still. Curtis Simpson is the Chief Information Security Officer at Armis.

IoT 98
article thumbnail

Five Interesting Israeli CyberSecurity Companies

Joseph Steinberg

For various reasons, when I wrote those two pieces, I intentionally featured innovators from outside of the information-security sector. Argus Cyber Security . Back in 2015 and 2017, I ran articles in Inc. Pay me this ransom or I will cause your car to crash while you are driving at high speed!”.