Remove 2017 Remove Education Remove Manufacturing
article thumbnail

The IoT Cybersecurity Act of 2020: Implications for Devices

eSecurity Planet

For any IoT device vendors currently contracted by the government, this is what we know so far from the National Institute of Standards and Technology (NIST): Required reading for IoT manufacturers: foundational guidelines about IoT vulnerabilities ( 8259 ) and a core baseline of necessary cybersecurity components ( 8259A ). Data protection.

IoT 145
article thumbnail

Hyundai suffered a data breach that impacted customers in France and Italy

Security Affairs

In December 2019, German media reported that hackers suspected to be members of the Vietnam-linked APT Ocean Lotus ( APT32 ) group breached the networks of the car manufacturers BMW and Hyundai. The intrusion aimed at stealing automotive trade secrets.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Siemens Metaverse exposes sensitive corporate data

Security Affairs

The WordPress sets only exposed user names and avatar pictures, but all four Siemens WordPress-based subdomains were vulnerable to a flaw that WordPress itself fixed in 2017, leaving researchers wondering whether there are more severe vulnerabilities on these sites. There are a lot of opportunities for threat actors here.

IoT 98
article thumbnail

GUEST ESSAY: The story behind how DataTribe is helping to seed ‘Cybersecurity Valley’ in Maryland

The Last Watchdog

Bureau of Labor Statistics, the Baltimore metropolitan area alone had more than 61,000 people working in computer and mathematical occupations as of May 2017, almost all in IT-related fields. According to the U.S. This made it the nation’s eighth-largest technology hub.

article thumbnail

80% of organisations affected by cyber security skills gap

IT Governance

Although this figure is alarmingly high, CyberEdge notes that the skills gap decreased by ten percentage points compared to its 2017 report. The education sector (87.1%) is the most affected, followed by telecommunications and technology (85.1%), manufacturing (81.5%) and finance (81.4%).

article thumbnail

Calculating the Benefits of the Advanced Encryption Standard

Schneier on Security

Extending the approach of looking back from 2017 to the larger national economy required the selection of economic sectors best represented by the 169 survey respondents. Thus, the NPV from today's perspective is $8,772,000,000; the B/C ratio is therefore 70.2/1; 1; and a measure (explained in detail in Section 6.1)

article thumbnail

China Publishes Draft Regulations on Protecting the Security of Key Information Infrastructure

Hunton Privacy

On July 10, 2017, the Cyberspace Administration of China published a new draft of its Regulations on Protecting the Security of Key Information Infrastructure (the “Draft Regulations”), and invited comment from the general public. The Draft Regulations will remain open for comment through August 10, 2017. This post has been updated. .