Remove 2018 Remove Education Remove Manufacturing Remove Security
article thumbnail

To Make the Internet of Things Safe, Start with Manufacturing

Thales Cloud Protection & Licensing

Achieving the IoT’s bold objective requires not only bringing many small things together and carefully orchestrating their interconnections, but also the assurance that their integrity and the data they collect remains secure and trustworthy. Therefore, manufacturing is the first critical link in the chain to establish trust across the IoT.

article thumbnail

SEC Sanctions Public Company for Misleading Disclosures About Data Breach

Hunton Privacy

The SEC’s order alleges that on March 21, 2019, Pearson learned of a 2018 cyber intrusion that affected data stored on the server for one of its web-based software products. On August 16, 2021, the U.S. The server was accessed and downloaded by a “sophisticated threat actor” taking advantage of an unpatched vulnerability on the server.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The IoT Cybersecurity Act of 2020: Implications for Devices

eSecurity Planet

As more information about IoT device vulnerabilities is published, the pressure on industry and government authorities to enhance security standards might be reaching a tipping point. While it’s a progressive step for the network security of the U.S. While it’s a progressive step for the network security of the U.S.

IoT 144
article thumbnail

FTC Recommends Steps to Improve Mobile Device Security Update Practices

Hunton Privacy

On February 28, 2018, the Federal Trade Commission issued a report, titled Mobile Security Updates: Understanding the Issues (the “Report”), that analyzes the process by which mobile devices sold in the U.S. receive security updates and provides recommendations for improvement.

article thumbnail

80% of organisations affected by cyber security skills gap

IT Governance

Four out of five organisations can’t find qualified staff to fill cyber security positions, according to CyberEdge’s 2018 Cyberthreat Defense Report. The education sector (87.1%) is the most affected, followed by telecommunications and technology (85.1%), manufacturing (81.5%) and finance (81.4%).

article thumbnail

A component in Huawei network appliances could be used to take down Germany’s telecoms networks

Security Affairs

The security officials told lawmakers that the ministry’s investigation has been triggered by an energy management component from Huawei, two lawmakers present at the briefing who spoke under the condition of anonymity told POLITICO. . ” reported POLITICO. “Berlin has previously been criticized over its stance by U.S.

article thumbnail

CarsBlues Bluetooth attack Affects tens of millions of vehicles

Security Affairs

The CarsBlues attack leverages security flaws in the infotainment systems installed in several types of vehicles via Bluetooth to access user PII. The CarsBlues attack leverages security flaws in the infotainment systems installed in several types of vehicles via Bluetooth, it affects users who have synced their smartphone to their cars. .”