article thumbnail

Webinar on cyberattacks in Ukraine – summary and Q&A

SecureList

About the webinar. Currently, we assess that the risk of the cyber component of this conflict spilling over to Europe is medium-high. For example, infected IoT and network devices such as IP-cameras may be used by anyone, and may be infected and abused by attackers to launch attacks such as DDoS attacks.

DDOS 91
article thumbnail

DON’T PANIC! How to Manage IT Product Risk with Supply Chain Intelligence

Security Boulevard

With a growing number of threats to the digital supply chain, it’s time for security and procurement teams to work together to manage IT product risk. Join Eclypsium as we discuss new strategies for assessing the risk of new IT products such as PCs, servers, network equipment, IoT devices, and software applications.

Risk 49
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

What’s driving the security of IoT? The problem becomes – how do we make sure we’re securing these “driving data centers” against the risks and threats that lurk on the Internet? First off, connected vehicles and IoT devices are highly attractive targets to hackers. Guest Blog: TalkingTrust. Thu, 03/11/2021 - 07:39.

IoT 78
article thumbnail

Protecting Against the Risks and Managing the Complexities of a Quantum World with Thales and IBM Consulting

Thales Cloud Protection & Licensing

Protecting Against the Risks and Managing the Complexities of a Quantum World with Thales and IBM Consulting madhav Thu, 01/25/2024 - 11:03 Contributors: Ollie Omotosho - Director, Strategir Partnerships, Thales Antti Ropponen, Head of Data & Application Security Services, IBM Consulting In the world of business, data security is paramount.

Risk 87
article thumbnail

Spotlight Podcast: Managing the Digital Risk in your Digital Transformation

The Security Ledger

But do they really understand the risks lurking in their digital transformation strategies? In this Spotlight Podcast, sponsored by RSA,* we're joined by RSA Portfolio Strategist Steve Schlarman for a discussion of managing the risks in digital transformation. Re-Thinking Cyber Risk.

article thumbnail

Extending Zero Trust Security to Industrial Networks

Cisco Security

I recently presented a webinar explaining the specific Zero Trust requirements for IoT/OT networks: Endpoint visibility. You need risk scoring to prioritize your strategy for compliance improvement. Learn more by watching the replay of the webinar I recently presented. Network segmentation. What about you? LinkedIn.

IoT 88
article thumbnail

Multi-cloud use by healthcare providers puts patient data at risk

Thales Cloud Protection & Licensing

healthcare organizations are nearly universal in the adoption of digital transformation technologies (cloud, SaaS applications, big data, IoT, digital payments, containers, and blockchain). Thales will also host a webinar on Thursday, Sept. And the cloud is arguably the most daunting of these environments, and the most widely deployed.