article thumbnail

WEF Outlines Path to Cyber Resilience for Manufacturing Sector

SecureWorld News

The manufacturing sector faces an increasingly daunting cyber threat landscape that puts production operations, intellectual property, and entire supply chains at risk. Manufacturers must make cyber resilience a fully institutionalized part of their organizational identity." trillion annually. "

article thumbnail

Passwordless Authentication without Secrets!

Thales Cloud Protection & Licensing

However, industries reliant on shared devices—such as healthcare, retail, and manufacturing—face unique challenges. Similarly, in retail and manufacturing, delays caused by authentication procedures reduce overall efficiency. These fast-paced environments need a more flexible approach to balance security, speed, and user privacy.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Johnson & Johnson CISO Marene Allison: ‘You can’t sit on today’s technology’

CSO Magazine

The oath Marene Allison took years ago to defend and protect the United States is the same tenet that now guides her work maintaining cybersecurity at one of the largest pharmaceutical and consumer packaged goods manufacturers in the world. It’s important to understand I’m here to protect this company that is focused on human healthcare.

CISO 129
article thumbnail

What CISOs need to know about Wi-Fi 6E

CSO Magazine

And I predict the rules we adopt today will play a major role in the growth of the internet of things, connecting appliances, machines, meters, wearables, smart televisions, and other consumer electronics, as well as industrial sensors for manufacturing.” To read this article in full, please click here

CISO 141
article thumbnail

CISOs, beware of spyware tools for illicit competitive intelligence

CSO Magazine

Department of Justice (DOJ) released information surrounding the guilty plea of Mexican businessman Carlos Guerrero and his conspiracy to sell and use hacking tools that were manufactured by companies in Italy, Israel, and elsewhere.

Spyware 128
article thumbnail

The Surveillance Invasion: IoT and Smart Devices Stealing Corporate Secrets

Security Boulevard

Chris Clements, VP of Solutions Architecture at CISO Global “Hey Alexa, are you stealing my company’s data?” In an age where manufacturers have decided that just about every device needs to be “smart,” it’s becoming difficult to avoid the data collection and privacy invasion that are often baked into these devices.

article thumbnail

Verizon's 2025 DBIR: Threats Are Faster, Smarter, and More Personal

SecureWorld News

Manufacturing: IP theft and ransomware are top risks; OT/ICS systems still lag in basic controls. The 2025 DBIR is a call to arms for CISOs and security leaders to rethink how they detect, respond to, and recover from breaches. James Scobey , CISO at Keeper Security: "Humans are always the weakest link in 'abuse of trust' attacks.