article thumbnail

Cybersecurity Labeling of IoT Devices: Will It Happen in 2023?

SecureWorld News

consumers could have a set of cybersecurity labeling standards to protect their Internet of Things (IoT) devices as early as spring 2023 if the White House National Security Council has its way. The move ties in nicely with October being Cybersecurity Awareness Month. In February 2022, the U.S.

IoT 74
article thumbnail

The Dawn of True IoT Security

CyberSecurity Insiders

Internet of Things (IoT) devices are now everywhere. To discover more about CISSP read our whitepaper, 9 Traits You Need to Succeed as a Cybersecurity Leader. Discover how the CISSP has distinguished cybersecurity professionals as industry leaders from around the globe through the CISSP interview series.

IoT 117
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

News Alert: Utimaco finds regional disparities in consumers’ level of trust in digital security

The Last Watchdog

In light of this Utimaco released its first edition in the Circles of Trust survey series in 2022 focused on a sample of the United Kingdom (UK), Spain and Germany, covering key sectors of automotive cybersecurity to the public and the health sector to uncover consumer perceptions about the digital services that they use every day.

article thumbnail

The Aggregation Model is Falling Short

Security Boulevard

The following is an excerpt from our recent whitepaper, “Why Traditional Cybersecurity Tools Cannot Defend Against Zero-Day and No Signature Attacks,” in which we dive into how traditional cybersecurity tools work, why this fundamentally limits them from being able to detect zero-day or previously unknown attacks, why the industry standard for breach (..)

article thumbnail

Oldsmar’s Cyber Attack Raises the Alarm for the Water Industry

Cisco Security

Most industrial equipment has no cybersecurity feature. Making cybersecurity top of mind. In the European Union, the NIS Directive classifies water utilities as critical infrastructures that must identify their cybersecurity risks, train their personnel, and build measures for response and recovery. And the list could go on.

article thumbnail

Six existential threats posed by the future of 5G (Part One)

CyberSecurity Insiders

Securing millions of new IoT connections. From a device management point of view, 5G will work in a fundamentally different way to previous cellular generations, in that, as well as connecting smartphones, it will also be relied upon to connect over 22 billion IoT devices by 2024.

IoT 101
article thumbnail

How to ensure security and trust in connected cars

CyberSecurity Insiders

In this sense, the challenge for original equipment manufacturers (OEM) is twofold: ensuring high-quality, around-the-clock connectivity in all conditions while providing high-level cybersecurity and data protection protocols across the value chain. How to ensure cybersecurity and trust in connected vehicles. Why cellular?