article thumbnail

Firms with exposed IoT have a higher concentration of other security problems

SC Magazine

Exposed enterprise IoT devices can be an indicator of security issues to come, with firms sporting exposed devices having a 62% higher density of other security problems, new research shows. SC Media spoket o Kelly White, RiskRecon founder and CEO, to find out. If you have that IoT device, what had to go wrong?

IoT 98
article thumbnail

Water utility CISO offers tips to stay secure as IT and OT converge

SC Magazine

Kristin Sanders, CISO for the Albuquerque Bernalillo County Water Utility Authority, revealed how New Mexico’s largest water and wastewater utility has been addressing the security challenge. The post Water utility CISO offers tips to stay secure as IT and OT converge appeared first on SC Media. Asaavedra32, CC BY-SA 3.0

CISO 82
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Key Cybersecurity Trends for 2024: My Predictions

Jane Frankland

The proliferation of IoT devices and sensors will accelerate, allowing organisations to collect and leverage data for improved operational efficiency and real-time monitoring. IOT attacks aren’t showing any signs of slowing. As IoT continues to expand, cybercriminals will exploit vulnerabilities in IoT devices to carry out attacks.

article thumbnail

Too Much Holiday Cheer? Here’s Something to Fear: Cybersecurity Predictions for 2020

Adam Levin

At times it can seem like a war of attrition, which brings us to the first series of predictions for 2020: CISOs will get worse at their jobs. IoT botnets will make dystopian paranoia seem normal. IoT will continue to grow exponentially. In 2020 there will be somewhere around 20 billion IoT devices in use around the world.

article thumbnail

Cybersecurity Risks of 5G – And How to Control Them

eSecurity Planet

Exposing the Internet of Things (IoT) Universe. Consumer electronics, business, network appliances, and industrial IoT (IIoT) devices are all driving the exponential growth of IoT systems. Consumer electronics, business, network appliances, and industrial IoT (IIoT) devices are all driving the exponential growth of IoT systems.

Risk 136
article thumbnail

How to build a zero trust ecosystem

SC Magazine

With its tailored controls, micro-perimeters and trust-nothing approach to access, Zero Trust gives CISOs confidence that their security program can secure their remote workforce and meet regulatory compliance requirements. The post How to build a zero trust ecosystem appeared first on SC Media. James Carder, LogRhythm CSO.

CISO 134
article thumbnail

A New Milestone In Protecting Critical Infrastructure

Security Boulevard

By Curtis Simpson, CISO. Get insights from our whitepaper on industrial IoT security or book a demo to review our innovative agentless approach. As the CISO at Armis, Simpson is responsible for ensuring that the Armis product continues to maintain its high standard and vigilant focus on platform and customer security and privacy.

CISO 52