According to IDC, by 2025 there will be 41.6 billion Internet of Things (IoT) devices, generating a massive 79 zettabytes (ZB) of data. To put that into perspective, in 2006, IDC estimated that the total amount of electronic data created and stored was a mere 0.18 ZB. This growing amount of data represents a vast and exponentially increasing attack surface, which poses a huge opportunity for cybercriminals and a seemingly insurmountable task for those responsible for protecting and securing it. This task is only made more difficult by the lack of regulation and security measures being built into IoT devices at present. As IoT looks to become a foundational aspect of our everyday lives, it’s vital we, as consumers, understand the threats posed to our devices and the data they store.
The Transportation Security Administration (TSA) announced the new members of the Aviation Security Advisory Committee (ASAC), which includes the appointment of four new members, the reappointment of 15 members, and the full list of other committee members serving their term.
As many employees transfer back to a more traditional business setting from remote work environments, adjustments to cybersecurity protocols are going to be necessary. Organizations will need to evaluate any temporary provisions that were put into place during the COVID-19 pandemic, including any shortcuts that were taken and processes that were circumvented, and whether such protocols should be reversed or enhanced.
We speak to Saad Gul, Co-Chair of the Poyner Spruill, LLP, privacy and cybersecurity team, and learn about the Lifespan HHS investigation, what it means for data security professionals and why the HSS ruling should be a warning to all companies with HIPPA information.
The U.S. Department of State’s Rewards for Justice (RFJ) program, which is administered by the Diplomatic Security Service, is offering a reward of up to $10 million for information leading to the identification or location of any person who works with or for a foreign government for the purpose of interfering with U.S. elections through certain illegal cyber activities.
Beginning in M86, Chrome will warn users when they try to complete forms on secure (HTTPS) pages that are submitted insecurely. These “mixed forms” (forms on HTTPS sites that do not submit on HTTPS) are a risk to users’ security and privacy. Information submitted on these forms can be visible to eavesdroppers, allowing malicious parties to read or change sensitive form data, says Google.
Digital transformation with Internet of Things (IoT) devices provides many organizations a way forward, but optimizing the strategy needs to start with security.
Across industries, organizations seek to embrace Internet of Things (IoT) devices to reduce manual tasks and promote social distancing. However, IoT devices often lack basic security controls which lead to new cybersecurity risks across the IT stack. A comprehensive solution for managing IoT as part of organizations’ growth plans must also incorporate establishing best practices for moving forward securely.
Attackers are looking beyond network systems and devices to target organizations via public-facing platforms and SaaS resources. An effective DRP service will identify threats across an organization’s digital footprint, analyze the credibility of these threats and remediate malicious activity on third-party platforms to minimize system and reputational damage.
NIST unveiled the final version of its Zero Trust Architecture publication, which gives private sector organizations a road map for deploying the cybersecurity concept across the organization.
Until March, there was a consistent narrative about supply chains and technology. Digitization had, gradually, come some way in the world of logistics. Manufacturers, shipping companies, and retailers — and the many other firms with solutions that represent the connective tissue between them — had been steadily integrating hardware and software technologies that leverage the internet (both “of things” and not).