article thumbnail

Spotlight: Your IoT Risk Is Bigger Than You Think. (And What To Do About It.)

The Security Ledger

In this Spotlight edition of the podcast, we’re joined by Curtis Simpson, the Chief Information Security Officer at Armis. Curtis and I discuss the growing cyber risks posed by Internet of Things devices within enterprise networks. Curtis Simpson is the Chief Information Security Officer at Armis.

IoT 98
article thumbnail

GUEST ESSAY: As cyber risks rise in 2020, as they surely will, don’t overlook physical security

The Last Watchdog

Physical security is the protection of personnel and IT infrastructure (such as hardware, software, and data) from physical actions and events that could cause severe damage to an organization. Related: Good to know about IoT Physical security is often a second thought when it comes to information security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Use Your Asset Management Software to Reduce Cyber Risks

CyberSecurity Insiders

The best asset management software sets up a stock of your organization’s assets, phases of their entire life cycles, most recent software upgrades, the risks they could face, and the approaches to ensure their security. . . IoT devices could be used like botnets so as to execute DDoS attacks. . . Conclusion.

article thumbnail

How Has CAP Certification Evolved to Lead in Risk Management?

CyberSecurity Insiders

As the needs in cyber risk management change, so must the credentials that support them. As the needs in cyber risk management change, so must the credentials that support them. ISC)² is answering the call with updated Certified Authorization Professional (CAP) certification exams.

Risk 126
article thumbnail

Million of vehicles can be attacked via MiCODUS MV720 GPS Trackers

Security Affairs

“With the fast growth in adoption of mobile devices and the desire for our society to be more connected, it is easy to overlook the fact that GPS tracking devices such as these can greatly increase cyber risk if they are not built with security in mind.

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

Since founding Cedric Leighton Associates, he has become an internationally known strategic risk expert. Leighton is also a founding partner of CYFORIX, specializing in the field of cyber risk. She is also the host of the Mastering Cyber podcast. She also served as the deputy chief information officer of the White House.

article thumbnail

Vulnerability Management vs. Risk Management: Defining the Fundamentals

NopSec

With all this speed and the increasing reliance on communications and data-sharing both internally and externally comes the danger of inadequate accounting for and management of cyber risks. There are two fundamental categories that anyone involved in information security should understand: vulnerabilities and risks.

Risk 52