article thumbnail

5 Fundamental But Effective IoT Device Security Controls

Threatpost

Matt Dunn, the associate managing director for cyber-risk at Kroll, discusses how to keep networks safe from insecure IoT devices.

IoT 121
article thumbnail

Inside the Complex Universe of Cybersecurity

SecureWorld News

Working as CISO, DeSouza's areas of expertise include strategic planning, risk management, identity management, cloud computing, and privacy. The recent Verkada incident serves as a stark reminder, emphasizing the pressing need for CISOs to prioritize integrated IoT security and privacy in their strategic considerations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

Since founding Cedric Leighton Associates, he has become an internationally known strategic risk expert. Leighton is also a founding partner of CYFORIX, specializing in the field of cyber risk. He was previously senior manager at Deloitte, focused on IoT and industrial cybersecurity.

article thumbnail

Charlotte Conference Kicks Off Season with Thought Leaders' Expertise

SecureWorld News

Some other topics covered throughout the day included: How to Build an Insider Threat Program Moving to an Endpoint-Centric Zero Trust Security Model Increasing Attack Vectors from Overlayed IOT Devices Your Career in Cybersecurity Navigating the Insider Threat Landscape Rise of the Machines.

article thumbnail

Top Breach and Attack Simulation (BAS) Vendors

eSecurity Planet

Breach and attack simulation (BAS) is a relatively new IT security technology that can automatically spot vulnerabilities in an organization’s cyber defenses, akin to continuous, automated penetration testing. DXC Technology has over 40 years of infosec experience, most of which as HPE’s Enterprise Services. DXC Technology. SafeBreach.

article thumbnail

The Hacker Mind Podcast: The Right To Repair

ForAllSecure

To answer these questions, Paul Roberts, Editor-in-Chief of the Security Ledger, has founded securepairs.org , a group of infosec experts who are volunteering their free time to fight for the digital right to repair in local legislation. Back then Paul was writing infosec stories for IDG and I was doing the same at ZDNet.

InfoSec 52
article thumbnail

The Hacker Mind Podcast: The Right To Repair

ForAllSecure

To answer these questions, Paul Roberts, Editor-in-Chief of the Security Ledger, has founded securepairs.org , a group of infosec experts who are volunteering their free time to fight for the digital right to repair in local legislation. Back then Paul was writing infosec stories for IDG and I was doing the same at ZDNet.

InfoSec 52