Remove Cybersecurity Remove IoT Remove Whitepaper
article thumbnail

The Dawn of True IoT Security

CyberSecurity Insiders

Internet of Things (IoT) devices are now everywhere. To discover more about CISSP read our whitepaper, 9 Traits You Need to Succeed as a Cybersecurity Leader. Discover how the CISSP has distinguished cybersecurity professionals as industry leaders from around the globe through the CISSP interview series.

IoT 90
article thumbnail

News Alert: Utimaco finds regional disparities in consumers’ level of trust in digital security

The Last Watchdog

In light of this Utimaco released its first edition in the Circles of Trust survey series in 2022 focused on a sample of the United Kingdom (UK), Spain and Germany, covering key sectors of automotive cybersecurity to the public and the health sector to uncover consumer perceptions about the digital services that they use every day.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Oldsmar’s Cyber Attack Raises the Alarm for the Water Industry

Cisco Security

Most industrial equipment has no cybersecurity feature. Making cybersecurity top of mind. In the European Union, the NIS Directive classifies water utilities as critical infrastructures that must identify their cybersecurity risks, train their personnel, and build measures for response and recovery. And the list could go on.

article thumbnail

Integrating Perimeter and Internal Defenses: 5 Facts That May or May Not Surprise

Cisco Security

This blog has been authored by Frank Dickson, Program Vice President, Cybersecurity Products Practice, and Christopher Rodriguez, Research Director, IDC Network Security. Learn more from IDC in this Cisco-sponsored whitepaper. As analysts, we can articulate the technical benefits. We’d love to hear what you think.

article thumbnail

How to ensure security and trust in connected cars

CyberSecurity Insiders

In this sense, the challenge for original equipment manufacturers (OEM) is twofold: ensuring high-quality, around-the-clock connectivity in all conditions while providing high-level cybersecurity and data protection protocols across the value chain. How to ensure cybersecurity and trust in connected vehicles. Why cellular?

article thumbnail

Six existential threats posed by the future of 5G (Part One)

CyberSecurity Insiders

Securing millions of new IoT connections. From a device management point of view, 5G will work in a fundamentally different way to previous cellular generations, in that, as well as connecting smartphones, it will also be relied upon to connect over 22 billion IoT devices by 2024.

IoT 101
article thumbnail

MWC 2021: Three key Thales innovations at this year’s event

CyberSecurity Insiders

Commercial drones are one of the fastest growing sectors of the IoT – and with MNOs able to play a key role in enabling this growth, I was pleased to feature in a panel discussion about industrial applications for mobile-enabled drones. Three steps for MNOs to fly into the commercial drone space. Here’s to many more!

Mobile 122