Remove Authentication Remove IoT Remove Research Remove Security
article thumbnail

More connected, less secure: Addressing IoT and OT threats to the enterprise

CIO

The Internet of Things (IoT) is a permanent fixture for consumers and enterprises as the world becomes more and more interconnected. By 2027, the global number of connected IoT devices is projected to exceed 29 billion, a significant increase from the 16.7 billion devices reported in 2023.

IoT 325
article thumbnail

Zero Trust Security for NIS2 compliance: What you need to know

CIO

Over 100,00 organizations are expected to be impacted by Network and Information Security Directive (NIS2) cybersecurity standards that European Union (EU) member states must implement by October 2024. [i] This concept of least-privilege access is fundamental to Zero Trust Security practices.

Security 242
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cybersecurity Snapshot: CISA Says Midnight Blizzard Swiped U.S. Gov’t Emails During Microsoft Hack, Tells Fed Agencies To Take Immediate Action

Tenable

Plus, a new survey shows cybersecurity pros are guardedly optimistic about AI. And the NSA is sharing best practices for data security. Cybersecurity and Infrastructure Security Agency (CISA) in its Emergency Directive 24-02 , sent to federal civilian agencies last week and made public this week. And much more!

article thumbnail

How CIOs Are Addressing The “Unsustainable” Security Challenge

CIO

The proliferation of cyber threats has become so great that earlier this year the Australian government issued the recommendation that organisations “ urgently ” adopt an enhanced cyber security posture. Cyber security attacks are an inevitability that all businesses should now be prepared for.

article thumbnail

6 cybersecurity trends we’re thankful for

The Parallax

You might think of cybersecurity professionals as tech’s collective “ watchers on the wall ”—the guardians who let you know when doom is coming. With that perspective, you might find it hard to believe that hackers, security researchers, and other cybersecurity experts have much to be thankful for, or to look forward to.

Trends 189
article thumbnail

Cybersecurity Snapshot: Insights on Log4Shell, the Metaverse, IoT, Pig Butchering, Active Directory

Tenable

Get the latest on Log4Shell’s global remediation status; the need for metaverse security rules; a shutdown of “pig butchering” domains; tips for secure IoT products; an informal poll about AD security; and more! . Cybersecurity and Infrastructure Security Agency (CISA). Log4j guidance from the U.S.

IoT 52
article thumbnail

Prioritizing AI? Don’t shortchange IT fundamentals

CIO

Fundamentals like security, cost control, identity management, container sprawl, data management, and hardware refreshes remain key strategic areas for CIOs to deal with. Data due diligence Generative AI especially has particular implications for data security, Mann says.