March to 5G could pile on heavier security burden for IoT device manufacturers
The financial burden of compliance with piling security standards could force some device manufacturers to walk away from highly regulated buyers like the Pentagon.
The financial burden of compliance with piling security standards could force some device manufacturers to walk away from highly regulated buyers like the Pentagon.
Lynn Haaland joined Zoom as chief compliance and ethics officer in January 2020 – only months before the pandemic took hold. SC Media caught up with Haaland to get her take on challenges and lessons learned during a year transformed by COVID-19.
SC Media spoke to Digital Guardian’s Debra Danielson and Connie Stack recently about their own career experiences, the evolution of diversity in the information security market, and the power of pink.
And would any water treatment facility judge the calculus differently – revert dollars from elsewhere perhaps – had they known such a cyber incident was coming? Even that is hard to say. We don’t know what would be sacrificed by that trade-off.
As a journalist I’ve spent years reporting about both our country’s strengths and weaknesses, mostly within the tech and government space. And yet, even in my own reporting and that of my peers, there is this precept that the U.S. is among the most advanced – superior even – in most every area of consequence.
Noteworthy is the combination of the targets, which adds up to what one researcher described as attacks against the backbone of the nation’s critical infrastructure.
As one expert told me, enterprise security is built for stability, while startup security is built for speed. But in all cases, investment in vulnerability management can make or break a business.
After what can best be described as a contentious 2020, let’s celebrate in 2021 the stellar development and leadership demonstrated throughout the cybersecurity vendor and enduser community.
Join us for an event Nov. 18-19, where experts from the cybersecurity community, across sectors, will examine today’s endpoint security challenge. And the challenges are many.
Having transitioned from the public sector to the private, Teresa Shea recognizes the need for those two verticals to work better together. The mutual skepticism bordering on distrust, which has been omnipresent for years, is both inefficient and unwarranted.