article thumbnail

6,009,014 MovieBoxPro Accounts Breached in Another Data Scraping Incident

IT Governance

Source 1 ; source 2 (Update) Insurance USA Yes 75,101 Airsoftc3.com Source 1 ; source 2 (Update) Insurance USA Yes 75,101 Airsoftc3.com Enforcement New UK laws for IoT device security The UK government has published new laws, mandating Internet-connected smart devices to meet a minimum security standard. Young, Inc.

article thumbnail

11 cyber security predictions for 2020

IT Governance

Attacks involving the IoT will continue. Attackers will use the IoT (Internet of Things) to gain access to targets, pivoting attacks through compromised devices or using their resources as part of cyber attacks. The IoT will be used in both attacks on domestic premises and in industrial espionage.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What is Confidential Computing? Definition, Benefits, & Uses

eSecurity Planet

See the Best Third-Party Risk Management Software & Tools IoT data processing Internet of Things (IoT) devices generate massive amounts of data that are rarely stored in a secure fashion. Blockchain and crypto security The encryption involved in confidential computing is especially useful in a blockchain environment.

article thumbnail

The Orion blockchain database: Empowering multi-party data governance

IBM Big Data Hub

Blockchain databases were designed to enhance trust in centralized ecosystems by incorporating tamper-evidence features into traditional databases. However, existing blockchain databases lack efficient tools for multiple parties to control shared data on the ledger.

article thumbnail

Meeting Evolving Business Needs – A Conversation Between RIM Educators and Thought Leaders

Information Governance Perspectives

ON LEADERSHIP OPPORTUNITIES AMIDST THE CONVERGENCE OF TECHNOLOGY AND REGULATORY PRESSURES… Although it’s not yet mainstream in every business, we do know that Big Data, IoT, and other emerging technologies are certainly driving some of the need for IG professionals. Technology is the main driver of our evolving profession.

article thumbnail

Have board directors any liability for a cyberattack against their company?

Security Affairs

Add to that, there is the risk of penalties and fines (which are not insurable in most jurisdictions) not only under privacy and data protection regulations but also on the basis of cybersecurity regulations that are now proliferating. What should directors do if a cyberattack happens to the company? there could be reputational damage.

Insurance 118
article thumbnail

Protecting Against the Risks and Managing the Complexities of a Quantum World with Thales and IBM Consulting

Thales Cloud Protection & Licensing

to initiate malicious transactions on long term blockchains or distributed ledgers. This type of threat poses interesting questions on the design of systems that have long life cycles – for example cars, transport infrastructure, core banking applications, and blockchain applications. How can Thales and IBM Consulting help you?

Risk 87