article thumbnail

SOC Technology Failures?—?Do They Matter?

Anton on Security

SOC Technology Failures?—?Do img src: [link] Most failed Security Operations Centers (SOCs) that I’ve seen have not failed due to a technology failure. Let’s stick to mostly technology focused failures. Perhaps the tool vendor made some incorrect assumptions about how their technology is really used in the real world?

article thumbnail

New survey shows US adults split on COVID-19 cell phone tracking and data collection

Tech Republic Security

Governments and organizations are unleashing new technologies to fight the spread of the coronavirus, adding to privacy and data collection concerns.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cloudy with Strategic Technology Macro Trends on the Horizon

SecureWorld News

Legacy technologies such as Virtual Private Networks (VPNs) do not scale and have been proven to be fraught with risk as evidenced by incidents such as nation-state attacks. Zero Trust leverages multiple People, Process & Technology safeguards (layered architecture). This gives rise to Network observability!

article thumbnail

BrandPost: The state of operational technology and cybersecurity

CSO Magazine

Today, the convergence of operational technology (OT) and IT networks is accelerating because organizations can use the data collected by physical equipment and Industrial Internet of Things (IIoT) devices to identify issues and increase efficiency.

article thumbnail

Surveillance by the US Postal Service

Schneier on Security

This is not about mass surveillance of mail , this is about sorts of targeted surveillance the US Postal Inspection Service uses to catch mail thieves : To track down an alleged mail thief, a US postal inspector used license plate reader technology, GPS data collected by a rental car company, and, most damning of all, hid a camera inside one of the (..)

article thumbnail

Serious Privacy Podcast – RegTech: Using the Power of Technology for Good (with Shub Nandi)

TrustArc

Technology brings new demands for compliance, especially given the amount of personal data collected through various means and how it is both used and combined. However, technology can also be used to assist compliance professionals by providing the necessary information quickly.

article thumbnail

Cyber Playbook: Information Technology vs Operational Technology – How to Leverage IT to Secure Your OT Systems

Herjavec Group

Information Technology (IT) primarily refers to hardware, software, and communications technologies like networking equipment and modems that are used to store, recover, transmit, manipulate, and protect data. . Operational technology has seen innovations that allowed it to become safer, more efficient, and more reliable.