Remove 2019 Remove Encryption Remove Manufacturing Remove Meeting
article thumbnail

New Guidance Published on Cybersecurity and Medical Devices

Data Matters

New European medical device guidance will require manufacturers to carefully review cybersecurity and IT security requirements in relation to their devices and in their product literature. In December 2019, the Medical Device Coordination Group (MDCG) published its guidance on cybersecurity for medical devices (the Guidance).

article thumbnail

The Growing Presence (and Security Risks) of IoT

Thales Cloud Protection & Licensing

In the absence of IoT security regulations, many smart product manufacturers simply release new devices that lack built-in security measures and have not undergone proper security review and testing. Take manufacturing, for instance. Such disruption could have serious consequences depending on the type of organization that’s affected.

IoT 122
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2019 end-of-year review part 1: January to June

IT Governance

A royal baby, a fire at Notre-Dame, the highest grossing film of all time and more than 12 billion breached data records: 2019 has been quite a year. IT Governance is closing out the year by rounding up 2019’s biggest information security stories. Part one covers January to June, and will be followed by part in the coming days.

article thumbnail

European Commission proposes reinforcement of EU Cybersecurity rules

DLA Piper Privacy Matters

In the NIS Directive, the obligations that apply to an entity that falls under the scope of the NIS Directive depend on its qualification as ‘operator of essential services’ (“OES”) or ‘digital service provider’ (“DSP”): An OES is defined as a public or private entity of a type referred to in Annex II, which meets certain criteria.

article thumbnail

OCR Provides Insight into Enforcement Priorities and Breach Trends

HL Chronicle of Data Protection

As OCR’s priorities change it is moving away from frequent enforcement on laptops and encryption towards enforcement for the HIPAA Right of Access and hacking cases. Network servers and email were the location of 65% of 2019’s breaches, a notable increase over historical percentages. million settlement in 2018. Version 1.0

Risk 40
article thumbnail

Top IoT Security Solutions of 2021

eSecurity Planet

IoT security is where endpoint detection and response ( EDR ) and enterprise mobility management ( EMM ) meet the challenges of a rapidly expanding edge computing infrastructure. Broadcom also offers a location hub microcontroller and System-on-a-Chip (SoC) systems for embedded IoT security for organizations handling product manufacturing.

IoT 138
article thumbnail

The Hacker Mind Podcast: DEF CON Villages

ForAllSecure

Yes, grasshoppers invaded Las Vegas at the start of hacker summer camp in 2019. Gosh, there must be 20 or more villages at DEFCON if you want to learn radio if you want to learn tampering with seals if you want to learn encryption, if you want to learn you name it. In Sin City, it's the Insect Invasion. NBC : putting on a show.