article thumbnail

Kingston Technology Wins Coveted Global InfoSec Awards During RSA Conference 2021

CyberSecurity Insiders

a world leader in memory products and technology solutions, is proud to announce it has won the following Global InfoSec Awards for its encrypted USB solutions family from Cyber Defense Magazine (CDM), the industry’s leading electronic information magazine: Data Loss Prevention Market Leader. Encryption Market Leader.

InfoSec 40
article thumbnail

Hackers Could Cause ‘Fake Earthquakes’ by Exploiting Vulnerable Seismic Equipment, Researchers Warn

Hot for Security

Seismic monitoring equipment is vulnerable to common cybersecurity threats like those faced by IoT devices, a new research paper warns. Non-encrypted data, insecure protocols and poor user authentication mechanisms are among the security issues that leave seismological networks open to breaches, the authors note.

IoT 128
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Danger and Opportunity in 5G Connectivity and IoT

Threatpost

The advent of 5G presents an opportunity for us to think the exploding number of IoT devices and how we securely connect to the digital world.

IoT 74
article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

How to screen for natural infosec talent: Ask for a worst case scenario for any common situation. Street is an industry-respected speaker and analyst and currently is the VP of InfoSec for SphereNY. Markstedter actively contributes to filling the infosec education gap. Read more: Top IoT Security Solutions of 2021.

article thumbnail

Cyber Playbook: Effective User-Centric Authentication is Critical for Modern Business

Herjavec Group

This means that all proper authentication protocols need to be employed, and encryption systems and extra layers of defense, like adaptive authentication, are needed to mitigate potential vulnerabilities. Every month one of HG’s experts will provide advice and insights based on their extensive experience in the infosec industry.

article thumbnail

IT threat evolution Q1 2021. Non-mobile statistics

SecureList

If the victim organization is slow to pay up, even though its files are encrypted and some of its confidential data has been stolen, the attackers additionally threaten to carry out a DDoS attack. IoT attacks. IoT threat statistics. New additions to the ransomware arsenal. Trojan-Downloader.Shell.Agent.p.

Mobile 91
article thumbnail

Skyscraper of cards

Notice Bored

Cryptography is the primary control, coupled with appropriate use of authentication and encryption processes in both hardware and software (e.g.'microcode' Not being able to tell precisely how many steps you've taken today, or being unable to read this blog, is hardly going to stop the Earth spinning on its axis.