Remove 2004 Remove Cyber Risk Remove Internet
article thumbnail

Last Watchdog’s IoT and ‘zero trust’ coverage win MVP awards from Information Management Today

The Last Watchdog

My primer on the going forward privacy and security implications of IoT — What Everyone Should Know About the Promise and Pitfalls of the Internet of Things — won second place in the contest’s IoT Security category. I’ve never done stories to win awards. That usually happens every time I publish a story under my byline.

IoT 37
article thumbnail

Q&A: Cybersecurity in ‘The Intelligent Era’

IT Security Guru

Notably, while cybersecurity professionals do not have to tackle AI ethical issues or the inherent biases in LLMs born from their internet and enterprise data training, the cybersecurity community can benefit from addressing these biases. This calls for, among other things, a “human in the loop.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spotlight Podcast: At 15 Cybersecurity Awareness Month Grows with Cyber Risk

The Security Ledger

And this year is a special occasion: a Quinceañera of sorts recognizing 15 years since the first Cybersecurity Awareness Month in 2004. As my guests this week note: the goals of Cyber Security focus and importance of cyber security awareness month has changed a lot since the early 2000s. October is Cybersecurity Awareness Month.

article thumbnail

Episode 162: Have We missed Electric Grid Cyber Attacks for Years? Also: Breaking Bad Security Habits

The Security Ledger

. » Related Stories Spotlight Podcast: Security Automation is (and isn’t) the Future of Infosec Episode 159: Deep Fakes and Election (in)Security with ZeroFOX Spotlight Podcast: Rethinking Your Third Party Cyber Risk Strategy. If you believe the headlines, the first known disruptive cyber attack against the U.S.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Vicarius Vulnerability management 2022 Private Dragos ICS and OT security 2021 Private Safeguard Cyber Risk management 2021 Private CyberGRX Risk management 2019 Private Signifyd Fraud protection 2018 Private RedOwl Security analytics 2015 Acquired: Forcepoint. AllegisCyber Investments.

article thumbnail

Author Q&A: Former privacy officer urges leaders to prioritize security as part of cloud migration

The Last Watchdog

Cyber threats have steadily intensified each year since I began writing about privacy and cybersecurity for USA TODAY in 2004. Cyber risks from third-party vendors further complicate the situation. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.

article thumbnail

An iCloud Backdoor Would Make Our Phones Less Safe

Schneier on Security

If the government demands Apple weaken its security worldwide, it would increase everyone’s cyber-risk in an already dangerous world. But the British law is written in a way that requires Apple to give its government access to anyone, anywhere in the world. In that mode, a majority of your data is end-to-end encrypted.