article thumbnail

Cybersecurity Labeling of IoT Devices: Will It Happen in 2023?

SecureWorld News

consumers could have a set of cybersecurity labeling standards to protect their Internet of Things (IoT) devices as early as spring 2023 if the White House National Security Council has its way. Come up with roughly four solid cybersecurity standards that manufacturers of IoT devices can use to properly label cybersecurity risks to users.

IoT 76
article thumbnail

News Alert: Utimaco finds regional disparities in consumers’ level of trust in digital security

The Last Watchdog

Just decades ago, the internet was something that could only be accessed from large, immobile personal computers. Auerbach In the US, respondents reported the highest levels of digital fraud from all sources, including banking and payments, Internet of Things (IoT) and Smart Cities.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Turn the corner into 2019 and we find Citigroup, CapitalOne, Wells Fargo and HSBC Life Insurance among a host of firms hitting the crisis button after their customers’ records turned up on a database of some 24 million financial and banking documents found parked on an Internet-accessible server — without so much as password protection.

article thumbnail

Six existential threats posed by the future of 5G (Part Two)

CyberSecurity Insiders

With the introduction of lockdowns across the globe, our reliance on internet networks to work remotely, call relatives across seas, or even to take part in leisure activities via a screen has soared. billion active internet users worldwide. Notwithstanding this progress, the quality of the internet services provided varies greatly.

Mobile 101
article thumbnail

Oldsmar’s Cyber Attack Raises the Alarm for the Water Industry

Cisco Security

Someone on the Internet successfully accessed the computer controlling the chemicals used to treat drinking water for the city and changed the level of sodium hydroxide to 11,100 parts per million (ppm), a significant increase from the normal amount of 100 ppm. How did this industrial workstation become accessible from the Internet?

article thumbnail

Post-Quantum Cryptography: Lessons Learned from SHA-1 Deprecation

Security Boulevard

“The results of our analysis clearly show that, while the most popular websites have done a good job of migrating away from SHA-1 certificates, a significant portion of the Internet continues to rely on them,” said Walter Goulet, a cloud solutions product manager at Venafi, in 2017. The presence of wildcard SSL certificates. Crypto-agility.

article thumbnail

TIA CEO: Supply chain standard shows feds ‘they don’t have to be heavy handed’

SC Magazine

The world recently came face-to-face with supply chain risk when nation-state hackers breached government and business alike through SolarWinds servers and other attack vectors. SC Media spoke to TIA CEO David Stehlin about the risks, and how an emerging standard could thwart them. So the risk has gone up exponentially.