article thumbnail

BrandPost: The state of operational technology and cybersecurity

CSO Magazine

Today, the convergence of operational technology (OT) and IT networks is accelerating because organizations can use the data collected by physical equipment and Industrial Internet of Things (IIoT) devices to identify issues and increase efficiency. However, IT/OT convergence also means cybersecurity is even more critical.

article thumbnail

Poland and Lithuania fear that data collected via FaceApp could be misused

Security Affairs

Many security experts are warning of the risks of using the popular app, threat actors could be potentially interested in data collected by FaceApp. SecurityAffairs – FaceApp, cybersecurity). The post Poland and Lithuania fear that data collected via FaceApp could be misused appeared first on Security Affairs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

On the 20th Safer Internet Day, what was security like back in 2004?

Malwarebytes

Today is the 20th Safer Internet Day. 2004 was a key year for several safety activities, encompassing both Safer Internet Day and the Safer Internet Forum. Was the general state of the Internet at the time so bad that all of these events sprang up almost out of necessity? You may be asking, why 2004?

article thumbnail

MY TAKE: ‘Network Detection and Response’ emerges as an Internet of Things security stopgap

The Last Watchdog

There’s no stopping the Internet of Things now. Data collected by IoT devices will increasingly get ingested into cloud-centric networks where it will get crunched by virtual servers. Commendably, the global cybersecurity community continues to push companies to practice cyber hygiene. I’ll keep watch.

Internet 195
article thumbnail

Reinventing Asset Management for Cybersecurity Professionals

IT Security Guru

Today, I’m excited to introduce Qualys CyberSecurity Asset Management (CSAM), which moves the needle further by adding security context to those capabilities and allowing organizations to detect the security gaps in their infrastructure and respond to the risk. CyberSecurity Asset Management video. Identify Assets and Sync with CMDB.

article thumbnail

Letting the Internet of Things into Your Home

SiteLock

I’ve decided it might be time to consider a letting the Internet of Things (IoT) into my home. For me, add to that a career in the cybersecurity industry where I’ve seen hackers pull off some pretty innovative things. Does it work without internet? Image property of Hanna-Barbera Productions.

article thumbnail

Cybersecurity Outlook 2022: Third-party, Ransomware and AI Attacks Will Get Worse

eSecurity Planet

About the only consensus on cybersecurity in 2022 is that things will get uglier, but in what ways? Here are some of the more interesting predictions for 2022 we’ve seen from cybersecurity researchers. Here are some of the more interesting predictions for 2022 we’ve seen from cybersecurity researchers.