Remove Digital transformation Remove InfoSec Remove IoT Remove Technology
article thumbnail

12 Pieces Examining Trends in Cybersecurity for 2023

SecureWorld News

Responses covered a variety of emerging threats and evolving trends affecting security technologies, leadership and regulation. Top 3 Information Security Hiring Trends for 2023 – " Here are three key takeaways to keep in mind when researching for a new role in InfoSec in 2023. ". Here is a look at the year ahead.".

article thumbnail

Episode 215-1: Jeremy O’Sullivan of Kytch On The Tech Serving McDonald’s Ice Cream Monopoly

The Security Ledger

Jeremy O’Sullivan, co-founder of the IoT analytics company, Kytch brings us the cautionary tale of his company’s travails with the commercial ice cream machine manufacturer, Taylor, whose equipment is used by the likes of Burger King and McDonalds. Report: Companies Still Grappling with IoT Security. Read the whole entry. »

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyber Playbook: Effective User-Centric Authentication is Critical for Modern Business

Herjavec Group

Over the past three decades, businesses around the world have been undergoing a rapid digital transformation. With the rapid digital transformation that took place in the past 18 months, many teams including those responsible for IAM programs needed to adjust to ensure a smooth and fully secured transition.

article thumbnail

The Hacker Mind Podcast: The Fog of Cyber War

ForAllSecure

There’s an online war in Ukraine, one that you haven’t heard much about because that country is holding its own with an army of infosec volunteers worldwide. RSAC also attracts some of the top researchers in infosec. So that's the last key we can speak to Ukraine's Deputy Minister of digital transformation.

article thumbnail

Top Breach and Attack Simulation (BAS) Vendors

eSecurity Planet

Breach and attack simulation (BAS) is a relatively new IT security technology that can automatically spot vulnerabilities in an organization’s cyber defenses, akin to continuous, automated penetration testing. DXC Technology. DXC Technology. SafeBreach holds multiple patents and awards for their BAS technology.