Remove Computer and Electronics Remove IT Remove Manufacturing Remove Privacy
article thumbnail

Use cases of secure IoT deployment

Thales Cloud Protection & Licensing

Requirements also included that the firmware was to be signed by the manufacturer and verified by the pacemaker. The solution allows the manufacturer to create an innovative process that maintains data safety throughout every communication. Use case 1: Fortune 500 Healthcare Company.

IoT 71
article thumbnail

France: the CNIL has released its annual dawn raid Program for 2023: four national priorities and one priority coming from the EDPB!

DLA Piper Privacy Matters

As a reminder, in 2022, the CNIL priority topics were (i) direct marketing (ii) monitoring telework and (iii) the use of cloud computing (see our previous post ). This document provides guidance on the conditions applicable to the use of this technology which presents high risks to the data subjects’ right to privacy.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

EU to Force IoT, Wireless Device Makers to Improve Security

eSecurity Planet

The European Union is poised to place more demands on manufacturers to design greater security into their wireless and Internet of Things (IoT) devices. Manufacturers will be required to adhere to the new cybersecurity safeguards when designing and producing these products. Common EU Security Standards. IoT market growth.

IoT 100
article thumbnail

Vulnerability Recap 3/25/24 – More Ivanti Issues to Patch

eSecurity Planet

We also saw a physical security issue in Saflok electronic locks, which affects hotels in over a hundred countries. While only a few major vulnerabilities emerged this week, Ivanti announced another notable set of flaws in both its Standalone Security and Neurons for ITSM products. The Standalone Security vulnerability affects versions 9.17.0,

article thumbnail

European Commission proposes reinforcement of EU Cybersecurity rules

DLA Piper Privacy Matters

A DSP is an information society service that is an online marketplace, an online search engine or a cloud computing service. As in many other recent legislative proposals, the Commission also envisages stronger enforcement and supervision of the rules. Extended scope. see also our previous blogpost on the NIS Directive).

article thumbnail

List of data breaches and cyber attacks in June 2021 – 9.8 million records breached

IT Governance

We found a comparatively low 9,780,931 breached records from publicly disclosed security incidents in June 2021. But don’t be fooled by that number – it comes from 106 incidents, which is roughly average for the year. June’s figures bring the annual running total of security incidents to 729 and the total number of breached records to 3,947,030,094.

article thumbnail

EU: NIS2 enters into force

DLA Piper Privacy Matters

Summary of key changes Extended scope – Under the previous NIS Directive, the obligations that applied to an entity depended on its qualification as an ‘operator of essential services’ (“ OES ”) or ‘digital service provider’ (“ DSP ”). NIS2 significantly expands the sectors and type of entities falling under its scope.