article thumbnail

Episode 250: Window Snyder of Thistle on Making IoT Security Easy

The Security Ledger

In this episode of the podcast, I speak with Window Snyder, the founder and CEO of Thistle Technologies about the (many) security challenges facing Internet of Things (IoT) devices and her idea for making things better: Thistle’s platform for secure development and deployment of IoT devices. The post Episode 250: Window Snyder of Thistle on.

IoT 98
article thumbnail

Episode 251: Kry10 CEO Boyd Multerer on building a secure OS for the IoT

The Security Ledger

Host Paul Roberts speaks with Boyd Multerer, the CEO and founder of Kry10, which has made a secure OS for the Internet of Things. Video Podcast ] | [ MP3 ] | [ Transcript ] The Internet of Things is growing – and fast. Video Podcast ] | [ MP3 ] | [ Transcript ] The Internet of Things is growing – and fast.

IoT 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: NIST Cybersecurity Framework has become a cornerstone for securing networks

The Last Watchdog

Prior to launching CyberSaint, Wrenn was CSO of Schneider Electric, a supplier of technologies used in industrial control systems. The CSF’s core principles have been incorporated into Europe’s GDPR , NYDFS’s cybersecurity requirement s, California’s Consumer Privacy Act and Ohio’s Data Protection Act. Talk more soon.

article thumbnail

Importance of Cybersecurity Profession Highlights SecureWorld Chicago

SecureWorld News

Faulkner was joined by Sarah Buerger, BISO, The Kraft Heinz Company; Mike Zachman, VP & CSO, Zebra Technologies; and Lynn Dohm, Executive Director, Women in CyberSecurity (WiCyS), who artfully moderated the panel discussion. Cedric Leighton, CNN Military Analyst; U.S. Air Force (Ret.);

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

A hacking collective compromised roughly 150,000 internet-connected surveillance cameras from Verkada, Inc., For starters, the hackers gained access to such a vast number Verkada cameras networks through a compromised “Super Admin” account, whose credentials Kottmann says were found publicly exposed on the internet.