article thumbnail

2020 Predictions: New Challenges for Data Privacy and the 5G Hackathon

Thales Cloud Protection & Licensing

A barrage of news about data breaches, government surveillance, and corporate misconduct has soured consumer sentiment on current data practices privacy regulators and authorities strive to protect consumer rights and shape the future of data protection. Consumer Rights and Privacy Fines. Conclusion.

article thumbnail

Britain introduces IOT Device Security Legislation

CyberSecurity Insiders

Dubbed as “The Product Security and Telecommunications Infrastructure(PSTI) bill, it requests those involved in the manufacturing of Internet of Things such as smart TVs, CCTVs, smart phones and fitness trackers; to follow basic standards while offering service and products to consumers.

IoT 139
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Australia’s move compelling VPNs to cooperate with law enforcement is all wrong

The Last Watchdog

When government agencies and international intelligence groups pooled together resources to gather user data, the VPN’s encryption seemed like the light at the end of the tunnel. Related: California enacts pioneering privacy law. This shakes the very foundations upon which Internet security and VPN end-to-end encryption are built.

article thumbnail

The Essential Guide to Radio Frequency Penetration Testing

Pen Test

This specialized form of testing has emerged as a crucial tool for evaluating the security of wireless networks and assessing their resilience against potential cyber-attacks (Davis & Brown, 2020). It has significantly impacted various industries, from telecommunications and healthcare to transportation and entertainment.

article thumbnail

Top 18 Cybersecurity Startups to Watch in 2021

eSecurity Planet

As attack methodologies evolve due to AI, machine learning and nation-state hackers , security startups are receiving a lot of funding to develop products that can secure application access for remote workers , provide real-time visibility into cyber attacks and protect data as it travels from the cloud to IoT devices.

article thumbnail

Key Cybersecurity Trends for 2024: My Predictions

Jane Frankland

Cybersecurity can often feel like a game of cat and mouse where cyber attackers and defenders engage in a chase, with one party trying to outsmart the other. Just like in previous years, 2024 is set to test practitioners’ skills as the frequency of cyber threats continues to surge leaving no room for complacency.