article thumbnail

11 cyber security predictions for 2020

IT Governance

Attacks involving the IoT will continue. Attackers will use the IoT (Internet of Things) to gain access to targets, pivoting attacks through compromised devices or using their resources as part of cyber attacks. The IoT will be used in both attacks on domestic premises and in industrial espionage.

article thumbnail

What is Confidential Computing? Definition, Benefits, & Uses

eSecurity Planet

This feature of confidential computing protects against rogue users within the network as well as users who fall victim to credential phishing attacks. See the Best Third-Party Risk Management Software & Tools IoT data processing Internet of Things (IoT) devices generate massive amounts of data that are rarely stored in a secure fashion.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The State of Blockchain Applications in Cybersecurity

eSecurity Planet

Whether perceived or real, a lack of understanding about blockchain technology has slowed the adoption of advanced distributed database technology in the past decade. This functionality makes forging a record in a blockchain ledger extremely difficult at best. However, federal officials didn’t reverse the blockchain transaction.

article thumbnail

NFTs: The Newest Collectible

eSecurity Planet

Also Read: Hacking Blockchain with Smart Contracts to Control a Botnet. Like cryptocurrency, NFTs are bought and sold through a blockchain that permanently records the transaction, but no one NFT is identical to another, unlike most crypto coins. Also Read: Could Blockchain Improve Security? Phishing Campaigns.

article thumbnail

Have board directors any liability for a cyberattack against their company?

Security Affairs

For example, an employee who clicks on a phishing e-mail always uses the same authentication credentials for work and private accounts or connects corporate devices to USB sticks or sites from which the threat actor can enter systems. Pierluigi Paganini. SecurityAffairs – hacking, cyberattack).

Insurance 114
article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Read more: Top IoT Security Solutions of 2021. Her research includes artificial intelligence , blockchain technology, and how psychology applies to IT. You are going to be phished long before you are going to be hit with CIA 0days. " me: "Is that Windows 98?!?" Parisa Tabriz | @laparisa. — thaddeus e.

article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

Indeed, organizations should be preparing to deploy such enterprise-level, targeted guidance strategies today, as doing so will prepare them for what will become increasingly complicated cybersecurity issues going-forward, in areas such as the Internet of Things (IoT), blockchain, and smart contract spaces. Managing Digital Identities.