Remove Computer and Electronics Remove Conference Remove IoT Remove Security
article thumbnail

MY TAKE: Why security innovations paving the way for driverless cars will make IoT much safer

The Last Watchdog

Intelligent computing systems have been insinuating themselves into our homes and public gathering places for a while now. The good news is that there is some very deep, behind-the-scenes research and development work being done to make driverless vehicles safe and secure enough for public acceptance. Deep testing.

IoT 133
article thumbnail

Supply Chain Security 101: An Expert’s View

Krebs on Security

Earlier this month I spoke at a cybersecurity conference in Albany, N.Y. alongside Tony Sager , senior vice president and chief evangelist at the Center for Internet Security and a former bug hunter at the U.S. National Security Agency. Tony Sager, senior vice president and chief evangelist at the Center for Internet Security.

Security 206
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: ‘Digital trust’ has a huge role to play mitigating cybersecurity threats, going forward

The Last Watchdog

Related: Leveraging PKI to advance electronic signatures. It used to be that trusting the connection between a workstation and a mainframe computer was the main concern. And yet at this moment, digital trust isn’t where it needs to be on the boardroom priority list or the IT security team’s strategy. Trust under siege.

article thumbnail

Ignoring Internet of Things Devices Could Be IdIoTic: eDiscovery Trends

eDiscovery Daily

See what I did there? ; o ) While I’m speaking at the University of Florida E-Discovery Conference today, let’s take a look at a couple of articles related to Internet of Things (IoT) devices that you need to know from an eDiscovery standpoint. Dana Conneally, managing partner at QDiscovery and Evidox Corp., But, that’s not all!

article thumbnail

Highlights from DefCon 2018

Thales Cloud Protection & Licensing

We attended the show with our colleague Paul Cleary and sat in on many talks (and demos) ranging from attacking IoT devices over insecure Bluetooth connections, to exploiting publically available expired certificates. The post Highlights from DefCon 2018 appeared first on Data Security Blog | Thales eSecurity. 509, SSH, PGP, etc.)

article thumbnail

Understanding eDiscovery in Criminal Cases, Part Three: eDiscovery Best Practices

eDiscovery Daily

The first, IoT devices, have been much discussed but not yet been a major data factor. On board computer systems in automobiles, Exif data in digital photos, GPS coordinates in Google maps are all examples of this type of data which has been used as evidence for years. The first is forensic images of computers and cell phones.

article thumbnail

Relativity Fest is Here! And So Are We!: eDiscovery Trends

eDiscovery Daily

The 2018 Relativity Fest conference is here! If you’re in the Chicago area, you can still make it for nearly all of the conference or attend on a one-day pass. Also, I will be covering the show for eDiscovery Daily , and I’m delighted to say that I will also once again be speaking at a session at the conference tomorrow.