article thumbnail

The GDPR, Year II

McAfee

or using an unsecured Wi-Fi network; using popular free messaging and meeting applications; using social media platforms for business purposes; not using VPN and other corporate solutions; having no back-up plan; lack of video surveillance. the proliferation of other people, Siri and Alexa and other listening/sensing devices.

article thumbnail

SHARED INTEL: New book on cyber warfare foreshadows attacks on elections, remote workers

The Last Watchdog

Learning about how hackers were able to intercept drone feed video from CIA observation drones during the war in Iraq, for instance, tells us a lot about how tenuous sophisticated surveillance technology really can be, out in the Internet wild. As that happens, it is possible to do things like eliminating the password and VPN.

Passwords 149
article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Vicarius Vulnerability management 2022 Private Dragos ICS and OT security 2021 Private Safeguard Cyber Risk management 2021 Private CyberGRX Risk management 2019 Private Signifyd Fraud protection 2018 Private RedOwl Security analytics 2015 Acquired: Forcepoint. AllegisCyber Investments.