Remove about
article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Editor’s note: I recently had the chance to participate in a discussion about the overall state of privacy and cybersecurity with Erin Kapczynski, OneRep’s senior vice president of B2B marketing. Erin: What cybersecurity technologies are you most excited about right now? Byron: It’s an important risk management tool.

article thumbnail

Cyber Insurance and the Changing Global Risk Environment

Security Affairs

When security fails, cyber insurance can become crucial for ensuring continuity. Our reliance on digital technology and the inherited risk is a key driving factor for buying cyber risk insurance. If the technology were to become unavailable, the resulting business impact could be mitigated with cyber insurance.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why Cybersecurity Pros Should Care About Governance

Getting Information Done

With the widespread use of mobile computing and the explosive growth of Internet of things (IoT) devices (growing from 6.4 As a result, companies are turning to cyber insurance. Certainly, insurers will be happy for the additional business, but they won’t be handing out claim payouts easily.

article thumbnail

The Ongoing Cyber Threat to Critical Infrastructure

Thales Cloud Protection & Licensing

Over the past decade, once siloed, Operational Technology (OT) systems have become increasingly connected to the internet, as water and energy systems become powered by intelligent IoT sensors and government operations are deep-rooted in data. It’s extremely important that leaders look at these strategies in earnest.

article thumbnail

Microsegmentation Is Catching On as Key to Zero Trust

eSecurity Planet

The idea of walling off the most critical assets in a network is a particularly good fit for critical infrastructure and industrial IoT, in which a wide range of legacy devices simply aren’t able to run traditional EDR software. “If you look at telcos, it’s all about the bigger picture,” he said.

article thumbnail

What is Confidential Computing? Definition, Benefits, & Uses

eSecurity Planet

Read on to learn more about confidential computing, how it works, and how it benefits enterprise data security efforts. Confidential computing is all about using technology to create an isolated safe space, otherwise known as a Trusted Execution Environment (TEE), for the most sensitive data and data processing instructions.

article thumbnail

Protecting Medical Data Against a Cyber-Attack Pandemic

Thales Cloud Protection & Licensing

Patient records were always valued by attackers for launching sophisticated insurance fraud schemes, purchasing medical supplies or drugs, or committing other types of fraud including identity theft. Increasing the use of advanced IoT devices. 40% are implementing a Bring-Your-Own-Key (BYOK) strategy, and 31% use a cloud-based service.

IoT 87