Remove cyber-risk we-secured-the-election-now-how-do-we-secure-trust-in-results-
article thumbnail

Supply Chain Security 101: An Expert’s View

Krebs on Security

alongside Tony Sager , senior vice president and chief evangelist at the Center for Internet Security and a former bug hunter at the U.S. National Security Agency. Tony Sager, senior vice president and chief evangelist at the Center for Internet Security. BK: Right, the Trusted Foundry program I guess is a good example.

Security 201
article thumbnail

Critical Success Factors to Widespread Deployment of IoT

Thales Cloud Protection & Licensing

Besides the obvious benefits, IoT devices create an expanded threat landscape and have already been exploited in numerous cyber attacks (e.g., The root cause of these attacks is that the devices are lacking the security mechanisms to defend themselves against malicious actions that lead to the control of hijacked devices.

IoT 96
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A Look Back On Five Key Developments in Cybersecurity and Data Protection in Southeast Asia in 2022

Data Protection Report

With the year 2022 firmly in the rear view, and as we look to start the new year in 2023, Norton Rose Fulbright’s Regulatory Compliance and Investigations team looks back and rounds up the five key cyber and data protection developments that took place in Southeast Asia in 2022. . in damages to its customer over data leak.

article thumbnail

Books Worth Your Time (Q4)

Adam Shostack

The Huawei and Snowden Questions , by Olav Lysne is a deep dive into what happens when an untrusted vendor builds your trusted computing base, and more importantly, why a great many of the “obvious” ways to address those risks are subject to easy work-arounds. How to design games. Cult of the Dead Cow , Joseph Menn.

Privacy 40
article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

Mike notes how some basic rules of physical hygiene that can slow the spread of COVID-19 can also map into the digital world. Here we were in the 21st century, and the lab was using an operating system that was no longer supported by Microsoft. Using older software within your own software always carries risk. Apple Podcasts.

IT 52
article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

Mike notes how some basic rules of physical hygiene that can slow the spread of COVID-19 can also map into the digital world. Here we were in the 21st century, and the lab was using an operating system that was no longer supported by Microsoft. Using older software within your own software always carries risk. Apple Podcasts.

IT 52
article thumbnail

5 Major Cybersecurity Trends to Know for 2024

eSecurity Planet

After receiving input from industry experts and doing my own analysis of the year’s driving forces, I identified five major cybersecurity trends. Bottom line: Prepare now based on risk. Without guidelines, organizations risk unfettered use of AI, risks of data leaks, and no recourse for unethical AI use within the organization.