Remove 10
Remove 2020 Remove IoT Remove Manufacturing Remove Strategy
article thumbnail

Top 10 of 2020: Our Favorite Pieces from a Weird Year

Thales Cloud Protection & Licensing

Top 10 of 2020: Our Favorite Pieces from a Weird Year. Thu, 12/31/2020 - 05:26. 2020 has certainly been an unusual year. Speaking of the intersection of healthcare and technology, we released our case study with medical device manufacturer Candela. Behnam Tabrizi, Harvard Business Review.

article thumbnail

Three Ways to Protect Unfixable Security Risks

eSecurity Planet

Industries with very expensive operational technology (OT) and Internet of Things (IoT) devices, such as healthcare or industrial manufacturing, can be especially vulnerable. As recently as 2020, 83% of medical imaging devices ran on operating systems that no longer receive updates. 3 Ways to Defend Unprotected Devices.

Risk 131
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: PKI, digital certificates now ready to take on the task of securing digital transformation

The Last Watchdog

I had a chance to interview Brian Trzupek , DigiCert’s senior vice president of emerging markets products, at the company’s Security Summit 2020 in San Diego recently. Data is the new oil, futurist and theoretical physicist, Dr. Michio Kaku, told attendees of DigiCert Security Summit 2020.

article thumbnail

Top IoT Security Solutions of 2021

eSecurity Planet

IoT security is where endpoint detection and response ( EDR ) and enterprise mobility management ( EMM ) meet the challenges of a rapidly expanding edge computing infrastructure. As the enterprise attack surface grows, IoT is yet another attack vector organizations aren’t fully prepared to defend.

IoT 140
article thumbnail

Internet of Things Statistics

Information Matters

Finding “reliable” data about the installed base of Internet of Things (IoT) devices, market size and forecasts is not easy and can be expensive if you have to buy a commercial market report. Creating IoT stats is notoriously difficult depending on accuracy of models, assumptions and definitions. billion by 2020. Link: [link].

IoT 45
article thumbnail

Cybersecurity Risks of 5G – And How to Control Them

eSecurity Planet

Service providers and 5G-enabled device manufacturers both have critical roles to play in the success and sustainability of this wireless network rollout. Exposing the Internet of Things (IoT) Universe. IoT products are notoriously vulnerable appliances because the build prioritizes ease of use and connectivity.

Risk 137
article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

Most device or software manufacturers place backdoors in their products intentionally and for a good reason. Experts say the best defense is a multi-pronged network security strategy that includes a firewall, anti-malware software, network monitoring, intrusion detection and prevention (IDPS), and data protection. Backdoors.

Phishing 105