Remove Data collection Remove Data privacy Remove Internet Remove IoT
article thumbnail

Knock, Knock; Who’s There? – IoT Device Identification & Data Integrity Is No Joke

Thales Cloud Protection & Licensing

The Internet of Things (IoT) is very crowded. billion devices will be connected to the Internet by 2020 2. Connected things are what make the IoT – sensors, cameras, wearable electronics, medical devices, automatic controls. But making the IoT work requires trust in the devices and the data they collect.

IoT 72
article thumbnail

Cybersecurity Outlook 2022: Third-party, Ransomware and AI Attacks Will Get Worse

eSecurity Planet

“A near-future event could cause a massive depopulation of internet-connected devices. Along with China’s new data privacy law , companies can expect scrutiny of data uses and protection to continue to grow. Or even worse, widespread corruption of medical devices. Measuring Cybersecurity Progress.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Podcast Episode 130: Troy Hunt on Collection 1 and Tailit’s Tale of IoT Security Redemption

The Security Ledger

Tailit’s Tale of IoT Security Redemption. In our second segment this week: we’re used to hearing stories about connected device makers getting caught out with shoddy device security, insecure applications, dodgy data collection practices – or all three. You might want to give a listen to that podcast, as well.

IoT 45
article thumbnail

Three Reasons You Should Treat Applications as Machine Identities in Your Security Strategy

Thales Cloud Protection & Licensing

Protecting the identities of applications is one of three major challenges that must be addressed to ensure trust and facilitate the adoption of transformational technologies employing the use of connected devices (machines) in the rapidly growing Internet of Things (IoT) and DevOps environments.

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

A hacking collective compromised roughly 150,000 internet-connected surveillance cameras from Verkada, Inc., For starters, the hackers gained access to such a vast number Verkada cameras networks through a compromised “Super Admin” account, whose credentials Kottmann says were found publicly exposed on the internet.

article thumbnail

Top 18 Cybersecurity Startups to Watch in 2021

eSecurity Planet

As attack methodologies evolve due to AI, machine learning and nation-state hackers , security startups are receiving a lot of funding to develop products that can secure application access for remote workers , provide real-time visibility into cyber attacks and protect data as it travels from the cloud to IoT devices. SpiderSilk.