Remove Cyber Risk Remove IoT Remove Surveillance
article thumbnail

LW ROUNDTABLE — How 2024’s cyber threats will transform the security landscape in 2025

The Last Watchdog

Sundaresan Bindu Sundaresan , Cybersecurity Director, LevelBlue In 2025, cybercriminals will exploit supply chain vulnerabilities, ransomware, IoT botnets, and AI-driven phishing. Rising IoT use demands standards to prevent device weaponization, while AI-enabled phishing challenges defenses.

article thumbnail

GUEST ESSAY: As cyber risks rise in 2020, as they surely will, don’t overlook physical security

The Last Watchdog

Related: Good to know about IoT Physical security is often a second thought when it comes to information security. The internet of things (IoT) is widening the sphere of physical security as smart devices connected to business systems via the internet may be located outside of established secure perimeters.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Governance: The Road Ahead in an Era of Constant Evolution

SecureWorld News

The expanding digital attack surface The rapid adoption of cloud computing, IoT, and remote work has expanded the attack surface beyond what traditional governance models can effectively manage. IoT security gaps: Millions of connected devices often lack standardized security policies. Where is cybersecurity governance going?

article thumbnail

Critical Vulnerabilities Discovered in Popular Vehicle GPS Tracker

SecureWorld News

million devices in use worldwide, and if exploited in an attack, it could cut off fuel, stop vehicles from running, and be used as surveillance to track routes and locations. The tracker has roughly 1.5 MiCODUS customers include government, military, law enforcement agencies, and Fortune 1,000 companies.

article thumbnail

Cyber and Privacy Risks for Real Estate Enterprises

SecureWorld News

Cyber risk is an existential issue for companies of all sizes and in all industries. However, it also exposes companies to additional layers of risk. They should also work with their broker to assemble a clear and bespoke solution to transfer that portion of the risk to a cyber-physical damage insurance policy.

Risk 102
article thumbnail

Million of vehicles can be attacked via MiCODUS MV720 GPS Trackers

Security Affairs

“These vulnerabilities could impact access to a vehicle fuel supply, vehicle control, or allow locational surveillance of vehicles in which the device is installed.” Successful exploitation of these vulnerabilities may allow a remote actor to exploit access and gain control the global positioning system tracker.”

article thumbnail

Why is Chinese threat actor APT 41 in a tearing hurry?

Security Boulevard

These legislations mandate cyber risk and gap assessment, deployment of OT Security Operations Center (SOC), better reporting and asset visibility and enhanced monitoring of OT/ICS networks. Learn more about an IEC 62443-base cyber threat and risk assessment for your infrastructure. Penalties are in order as well.