article thumbnail

Cybersecurity Insights with Contrast CISO David Lindner | 2/9/24

Security Boulevard

Insight #1 From toasters to toothbrushes , the Internet of Things (IoT) continues to wreak havoc on the internet. IoT manufacturers need to do better. The post Cybersecurity Insights with Contrast CISO David Lindner | 2/9/24 appeared first on Security Boulevard.

CISO 62
article thumbnail

CISO's Challenges Involved with Business Leader & SOC

Trend Micro

Yohei Ishihara, IoT security evangelist at Trend Micro, discussed the challenges CISOs facing within organizations driving industrial IoT.

CISO 77
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 Things CISOs Need To Know About IoT Security

Appknox

The growth of the Internet and the increase in the adoption of devices has brought a new set of security challenges for enterprises - IoT security.

IoT 83
article thumbnail

Cybersecurity Insights with Contrast CISO David Lindner | 10/14

Security Boulevard

The White House says “Energy Star” security labels for Internet of Things (IoT) devices are coming! The post Cybersecurity Insights with Contrast CISO David Lindner | 10/14 appeared first on Security Boulevard. Insight #1. ". This is so exciting, but they need to be required and not opt-in. Insight #2. ". Insight #3. ".

CISO 102
article thumbnail

What CISOs Can Do to Win the Ransomware Game

The Security Ledger

In this Expert Insight, Jeffrey Wheatman, the Cyber Risk Evangelist at Black Kite, says that CISOs need to shift their approach: becoming more proactive in working to preventing ransomware attacks. And he provides some steps CISOs can take to ensure their companies stay safe. Read the whole entry. »

CISO 52
article thumbnail

Spotlight: Your IoT Risk Is Bigger Than You Think. (And What To Do About It.)

The Security Ledger

IoT and OT (operation technology) deployments are growing and pose challenges to organizations that are still. Related Stories Spotlight: Automation Beckons as DevOps, IoT Drive PKI Explosion Spotlight: Operationalizing MDR with Pondurance CISO Dustin Hutchison Spotlight: Operationalizing MDR with Pondurance CISO Dustin Hutchinson.

IoT 98
article thumbnail

How the CISO has adapted to protect the hybrid workforce

IT Security Guru

As CISOs embark on their transformational journeys, identifying these areas of weakness should be the top priority. This has led to CISOs shifting how they approach protecting the corporate perimeter with additional controls and monitoring tools being used to scan any access to the network. Cloud dominance .

CISO 97