article thumbnail

Knock, Knock; Who’s There? – IoT Device Identification & Data Integrity Is No Joke

Thales Cloud Protection & Licensing

The Internet of Things (IoT) is very crowded. Connected things are what make the IoT – sensors, cameras, wearable electronics, medical devices, automatic controls. But making the IoT work requires trust in the devices and the data they collect. The IoT is not making the job of securing networks any easier.

IoT 72
article thumbnail

US Senators introduce IoT cybersecurity bill

Data Protection Report

On August 1, 2017, US Senators unveiled a bipartisan bill to mandate baseline cybersecurity requirements for internet connected devices purchased by the federal government. Recent events show that the IoT is an attractive vector for a cyberattack.

IoT 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why Cybersecurity Pros Should Care About Governance

Getting Information Done

With the widespread use of mobile computing and the explosive growth of Internet of things (IoT) devices (growing from 6.4 Cybersecurity professionals need to understand the information risks their organization faces and how to leverage information governance, along with technology, to get the biggest bang for their buck.

article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Kapczynski Erin: Could you share your thoughts on the role of artificial intelligence, machine learning and the growth of IoT devices in both cyber defense and cyberattacks? Erin: Do you think cyber insurance should play a bigger role in companies’ cybersecurity strategies? Leadership should prioritize cybersecurity at all levels.

article thumbnail

Inrupt’s Solid Announcement

Schneier on Security

Data generated by your things — your computer, your phone, your IoT whatever — is written to your pod. If you want your insurance company to have access to your fitness data, you grant it through your pod. You authorize granular access to that pod to whoever you want for whatever reason you want. It’s yours.

IoT 119
article thumbnail

Book Recommendation: Tomorrow’s Jobs Today authored by Rafael and Abby Moscatel via IG GURU

IG Guru

Rafael is a well-respected Information Governance Professional (IGP), Certified Records Manager (CRM), and Certified Information Privacy Manager (CIPM). Abby is a California trial attorney for State Farm Mutual Automobile Insurance Company. Tomorrow’s Jobs Today is written by Rafael Moscatel and his spouse Abby Moscatel.

article thumbnail

Protecting Medical Data Against a Cyber-Attack Pandemic

Thales Cloud Protection & Licensing

Patient records were always valued by attackers for launching sophisticated insurance fraud schemes, purchasing medical supplies or drugs, or committing other types of fraud including identity theft. Increasing the use of advanced IoT devices. Centralize data security governance. Authenticate every medical IoT device.

IoT 87