article thumbnail

The Surveillance Invasion: IoT and Smart Devices Stealing Corporate Secrets

Security Boulevard

Chris Clements, VP of Solutions Architecture at CISO Global “Hey Alexa, are you stealing my company’s data?” In an age where manufacturers have decided that just about every device needs to be “smart,” it’s becoming difficult to avoid the data collection and privacy invasion that are often baked into these devices.

article thumbnail

Cybersecurity Insights with Contrast CISO David Lindner | 2/9/24

Security Boulevard

Insight #1 From toasters to toothbrushes , the Internet of Things (IoT) continues to wreak havoc on the internet. IoT manufacturers need to do better. The post Cybersecurity Insights with Contrast CISO David Lindner | 2/9/24 appeared first on Security Boulevard.

CISO 64
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Rise of Data Sovereignty and a Privacy Era

SecureWorld News

The potential loss of reputation from a privacy breach is a clarion call for business executives and CISOs. Stay abreast of: Current trends such as Zero Trust, Cloud Security, IoT Security, Ransomware, Supply Chain Security, BYOD / Mobile Security, etc. RELATED: Cybersecurity Labeling of IoT Devices: Will It Happen in 2023? ]

IoT 89
article thumbnail

BlackBerry Discloses Vulnerability After Months of Hiding

SecureWorld News

This is a decision that CISOs and executives must make with their bottom line in mind, and it's never an easy choice. This was because BlackBerry licenses QNX to "original equipment manufacturers" who use the technology to build products for their customers. Should it try to quietly mitigate the situation?

article thumbnail

2022 Cybersecurity predictions

CyberSecurity Insiders

While in past years, InfoSec was previously the focus and CISOs were the norm – we’re moving to a new cybersecurity world order that expands the role of the CISO to a CSO (Chief Security Officer). Manufacturing is a prime area for disruption with the increase in the number of IoT devices during the pandemic.

article thumbnail

Cybersecurity in 2022, Predictions for digital ecosystem facing more challenges and sophisticated threats

CyberSecurity Insiders

Strategic perspectives provide a glimpse of what cyber-trends will be pervasive, and tactical is focuses on what technical and policy remedies will need to be prioritized by CISOs, CIOs, and their IT shops. OT/IT and IoT convergence. State of the IoT 2020: 12 billion IoT connections (iot-analytics.com). Ransomware.

article thumbnail

The Cyber Insurance Landscape Has Grown More Complicated

SecureWorld News

A thorough process should include industry-specific evaluations such as the use and protection of an OT network in manufacturing or the volume of regulated records (PII, PHI or other) processed by the organizations in sectors such as healthcare or financial services.