Failing IoT security measures have led to a resurgence of the Cornflicker worm, impacting IoT connected healthcare devices and others — and that’s not going to cut it in today’s internet-driven, everything-connected world. IoT devices, in the healthcare world and elsewhere, must treated just as carefully as employee computers, servers, and other devices. They must be connected to network security, continuously monitored and scanned, maintained by way of security patches, and updated on a regular basis. There should be no halfway measures here, in the healthcare industry or otherwise — security of IoT connected devices is too important to business operations and business continuity.
Cisco revealed its plans for its collaboration business in 2020 moving towards a platform business differentiated on data, security and experience.
The damage a serious data breach goes beyond what happens to the bottomline. Don’t let it be the scandal that ruins your company. Here’s what you need to know to protect yourself.
With the launch of 2020, certain cybersecurity laws covering “smart” devices go into effect. As local (state) IoT cybersecurity regulation kicks in and federal regulation is looming, what does this mean for members of IoT ecosystems?
Facebook, no matter how hard they try to convince us, really doesn’t care about your privacy and it’s going to hurt Libra.
With the award of an important DoD clearance known as Level 6, Microsoft’s Azure cloud business became only the second to hold this important credential.
The Imperva data breach had serious consequences for CEO Chris Hylen, who has stepped down. This should get the attention of CEOs and senior leaders everywhere. Doing everything you can to create a business strategy with security at its core while also endeavoring to create a security first culture within the organization are business mission critical. Especially if you want to keep your job.
Adobe Creative Cloud vulnerability leaves 7.5 million customer emails exposed. The good news is that the misconfigured environment has been shut down. The bad news is that that’s 7.5 million users whose emails, and other information that could possibly be used by hackers, is potentially out there floating around.
Learn about the most common ways ransomware spreads and how you can protect your system from it.
Here’s a look at what characteristics differentiate the strongest cybersecurity programs from the rest and what they mean for all industries in general,