article thumbnail

Episode 229: BugCrowd’s Casey Ellis On What’s Hot In Bug Hunting

The Security Ledger

The post Episode 229: BugCrowd’s Casey Ellis On What’s Hot In Bug Hunting appeared first on The Security Ledger with Paul F. Related Stories Spotlight: When Ransomware Comes Calling Episode 226: The Cyber Consequences Of Our Throw Away Culture Spotlight: Automation Beckons as DevOps, IoT Drive PKI Explosion.

IoT 98
article thumbnail

2020 Predictions: New Challenges for Data Privacy and the 5G Hackathon

Thales Cloud Protection & Licensing

The adoption of emerging technologies like 5G will fuel the proliferation of Internet of Things (IoT) that’s often built with only a few security controls and therefore creating a larger attack surface that enterprises have to deal with., 5G tech will make the IoT a greater part of our everyday lives.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

HHS updates online tracker guidance

Data Protection Report

Our readers may recall that HHS had originally issued the Bulletin in December of 2002, which we summarized here. HHS also added a paragraph on its enforcement priorities, including the following: OCR is prioritizing compliance with the HIPAA Security Rule in investigations into the use of online tracking technologies.

article thumbnail

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

Using “digital farming” techniques such as moisture sensors in the soil and regular and infrared cameras on drones, the Internet of Things (IoT) can capture images nonstop and transmit them to a central location for processing. The pandemic is forcing every industry and every organization to reimagine their future.

article thumbnail

Public cloud vs. private cloud vs. hybrid cloud: What’s the difference?

IBM Big Data Hub

Internet companies like Amazon led the charge with the introduction of Amazon Web Services (AWS) in 2002, which offered businesses cloud-based storage and computing services, and the launch of Elastic Compute Cloud (EC2) in 2006, which allowed users to rent virtual computers to run their own applications.

Cloud 109
article thumbnail

The Hacker Mind Podcast: Ethical Hacking

ForAllSecure

The US Justice Department says it will no longer prosecute good-faith security researchers, but what constitutes good-faith security research? It will no longer prosecute good-faith security research that would have otherwise violated the Computer Fraud and Abuse Act (CFAA). Is hacking a crime? Who is responsible?

IT 52
article thumbnail

Top SD-WAN Solutions for Enterprise Security

eSecurity Planet

As organizations embrace hybrid IT environments, SD-WAN and the tools combine to form a Secure Access Service Edge (SASE) offering that gives organizations the latest capabilities for optimizing WANs and securing hybrid enterprise workloads. Networking specialists like Cisco and HPE’s Aruba are moving deeper into security.

Security 111