article thumbnail

STEPS FORWARD: Regulators are on the move to set much needed IoT security rules of the road

The Last Watchdog

New government rules coupled with industry standards meant to give formal shape to the Internet of Things (IoT) are rapidly quickening around the globe. When it comes to IoT, we must arrive at specific rules of the road if we are to tap into the full potential of smart cities, autonomous transportation and advanced healthcare.

IoT 220
article thumbnail

U.S. Air Force Awards Small Business Innovation Research (SBIR) Funding to Luminous Cyber for Secure Geolocation Technology

CyberSecurity Insiders

–( BUSINESS WIRE )– Luminous Cyber Corp. ( [link] ) today announced it has been awarded a Small Business Innovation Research (SBIR) grant from the U.S. Our secure geolocation technology already is commercially deployed and ready today to adapt for exacting requirements such as found across the U.S. About SBIR.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spotlight: Your IoT Risk Is Bigger Than You Think. (And What To Do About It.)

The Security Ledger

IoT and OT (operation technology) deployments are growing and pose challenges to organizations that are still. Related Stories Spotlight: Automation Beckons as DevOps, IoT Drive PKI Explosion Spotlight: Operationalizing MDR with Pondurance CISO Dustin Hutchison Spotlight: Operationalizing MDR with Pondurance CISO Dustin Hutchinson.

IoT 98
article thumbnail

Recent Tesla Hacks Highlight Importance of Protecting Connected Devices

eSecurity Planet

Within the last couple of months, smart device vulnerabilities have been piling up, prompting businesses to protect their Internet of Things (IoT) environments. While Teslas aren’t the typical business IoT device, their connection to the internet makes them a cyber threat as much as your business’s other IoT technology.

Hacking 125
article thumbnail

Vulnerability Recap 5/13/24 – F5, Citrix & Chrome

eSecurity Planet

Small business owners tend to adopt Tinyproxy and also tend to use part-time IT resources which potentially threatens related supply chains with third-party risk. Tinyproxy provides a lightweight, open-source HTTP/S proxy adopted by individuals and small businesses for basic proxy functionality.

article thumbnail

Decoding Security 127: We Got Conned

SiteLock

Breaking news last week, the NIST (National Institute of Standards and Technology) Small Business Cybersecurity Act was signed into law. The bill will provide an avenue of resources and guidelines for small businesses to reduce their cybersecurity risks.

article thumbnail

MY TAKE: Why consumers are destined to play a big role in securing the Internet of Things

The Last Watchdog

The drivers of IoT-centric commerce appear to be unstoppable. Count on the wide deployment of IoT systems to continue at an accelerated rate. There are already more IoT devices than human beings on the planet, according to tech industry research firm Gartner. This time the stakes are too high. Security-by-design lacking.

Internet 189