Remove CSO Remove Cyber threats Remove Internet Remove Technology
article thumbnail

Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk

The Security Ledger

In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments.

CSO 59
article thumbnail

Episode 250: Window Snyder of Thistle on Making IoT Security Easy

The Security Ledger

In this episode of the podcast, I speak with Window Snyder, the founder and CEO of Thistle Technologies about the (many) security challenges facing Internet of Things (IoT) devices and her idea for making things better: Thistle’s platform for secure development and deployment of IoT devices. Read the whole entry. »

IoT 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Australian electric grid vulnerable to Cyber Attacks via Solar Panels

CyberSecurity Insiders

Cyber Threat warnings were released when some technical experts suggested foreign actors can tap and control the rooftop solar panels while communicating with the grid via the internet. Nowadays, companies are showing a lot of interest in offering products loaded with connected technology.

article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 2)

The Last Watchdog

Or Shoshani , CEO and founder, Stream Security Shoshani As 2023 ends, we’re already seeing businesses adopting technology to diagnose and detect threats to their cloud infrastructure before they occur. Michiel Prins , Co-Founder, HackerOne Prins Ethical hackers are consistently first to pressure-test emerging technology.

article thumbnail

Vulnerabilities and exposures to rise to 1,900 a month in 2023: Coalition

CSO Magazine

The predictions are a part of the company’s Cyber Threat Index , which was compiled using data gathered by the company’s active risk management and reduction technology, combining data from underwriting and claims, internet scans, its global network of honeypot sensors, and scanning over 5.2 billion IP addresses.

article thumbnail

BrandPost: 4 Trends in Network Security to Keep an Eye On

CSO Magazine

Entitled “Network Security Without Borders: A Common Technology Stack for Network Security and Operations,” the study cites several factors that contribute to the growing challenge of network security: Increasingly sophisticated cyberthreat tools. Increasingly complex network security technology.

article thumbnail

Cyber nonprofits ask billionaire philanthropists to show them some love

SC Magazine

Craig Newmark Philanthropies has historically committed funds to cybersecurity causes and signed a letter this month calling for large philanthropic foundations and internet billionaires to consider doing the same. Photo by Jemal Countess/Getty Images). The nascent field, and society as a whole, needs their voices… and their dollars.”.