Enterprise Security News
112 views | +0 today
Follow
 
Scooped by Gordon Kiser
onto Enterprise Security News
Scoop.it!

Why the Product Information Supply Chain is Crucial for an Effective CPG Digital Strategy | Column | Consumer Goods Technology

This is a great article I decided to reprint by Omer Farooque. It could apply to those outside the CPG industry.


"Much like the "Merchandise supply chain" there is a parallel and (since the digital revolution) equally important "Product information supply chain". This information supply chain derives its characteristics from the lifecycle that the Product follows. The reason organizations redundantly expend time and money on managing product information within their four walls is due to the varying stages of the products lifecycle they are involved in."

more...
No comment yet.
Your new post is loading...
Scooped by Gordon Kiser
Scoop.it!

Connected light bulbs give off more than just light

Connected light bulbs give off more than just light | Enterprise Security News | Scoop.it
Turning on a “smart” light bulb may be the latest way people inadvertently flood the internet with their personal information.
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

Five Emerging Business Continuity Challenges For 2019 | 2018-12-18 | Security Magazine

Five Emerging Business Continuity Challenges For 2019 | 2018-12-18 | Security Magazine | Enterprise Security News | Scoop.it

Enterprise decision makers know to “expect the unexpected” when it comes to business continuity (BC) planning. But the increasingly complex threat environment is challenging organizations as never before to prepare for an expanding range of incidents. 

more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

Critical Infrastructure Under Persistent Threat | 2018-12-06 | Security Magazine

Critical Infrastructure Under Persistent Threat | 2018-12-06 | Security Magazine | Enterprise Security News | Scoop.it
The cyber threats facing Industrial Control Systems (ICS) include nation-state attacks, hacktivists, criminals and even trusted insiders. The frequency and ferocity of attacks are growing and continue to pose a major challenge to those ICS practitioners and cybersecurity teams tasked with protecting our critical national infrastructure (CNI). The impact of potential threats to these systems relates to physical processes and can result in downtime of systems causing power, electricity or water outages. Any downtime can affect a plant’s ability to operate, its productivity and availability. . . .
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

As Drones Become Tools of War, Companies Turn to Hacking Them

As Drones Become Tools of War, Companies Turn to Hacking Them | Enterprise Security News | Scoop.it
As drones become commonplace, companies are developing models that can hack from the air. But it's just as easy for hackers to hijack those same drones.
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

Alphabet Chronicle to tackle cybersecurity industry

Alphabet Chronicle to tackle cybersecurity industry | Enterprise Security News | Scoop.it
Alphabet's X 'Moonshot' start-up Chronicle wants to shake up the cybersecurity landscape.
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

6 Reasons Why IoT Security Is Terrible - IEEE Spectrum

6 Reasons Why IoT Security Is Terrible - IEEE Spectrum | Enterprise Security News | Scoop.it
The Internet of Things bears little resemblance to traditional IT systems—and that makes it harder to protect
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

The IoT's Perplexing Security Problems | Cybersecurity | TechNewsWorld

The IoT's Perplexing Security Problems | Cybersecurity | TechNewsWorld | Enterprise Security News | Scoop.it
Worldwide IoT spending will total nearly $773 billion this year, IDC has predicted. The IoT will sustain a compound annual growth rate of 14.4 percent, and spending will hit $1.1 trillion by 2021, according to the firm's forecast. Consumer IoT spending will total $62 billion this year, making it the fourth largest industry segment, after manufacturing, transportation and utilities.
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

Can you hack a drone?

Can you hack a drone? | Enterprise Security News | Scoop.it
Hack a drone? The short answer is yes. The long answer? Read more about hacking a drone at HowStuffWorks.
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

How to Protect Your UAV from Data Hacking and Ensure Drone Security

How to Protect Your UAV from Data Hacking and Ensure Drone Security | Enterprise Security News | Scoop.it
The absence of adequate drone security and secure UAV systems can result in massive drone hacking and the public to have a shift of opinion on drones.
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

Hackers using drones to commit crimes - Denver7 TheDenverChannel.com

Hackers using drones to commit crimes - Denver7 TheDenverChannel.com | Enterprise Security News | Scoop.it
We see them everywhere. People are flying them all over the place. But there's a more serious, nefarious side to what should just be fun. Hackers are turning drones into devices that stea
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

5 computer security facts that surprise most people

5 computer security facts that surprise most people | Enterprise Security News | Scoop.it
As a 30-year road warrior, I’ve learned some security truths that seem wrong, but must be accepted if you really want to understand the threats you face.
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

Audit finds Department of Homeland Security's security is insecure • The Register

Audit finds Department of Homeland Security's security is insecure • The Register | Enterprise Security News | Scoop.it
The agency that keeps America safe runs un-patched Flash, and worse besides
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

2019 Cybersecurity Predictions: Cloud Security

2019 Cybersecurity Predictions: Cloud Security | Enterprise Security News | Scoop.it
Stan Lowe, CISO, Zscaler Global governments will look to the private sector to help with securing cloud apps as they offload commodity IT applications and
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

Healthcare Organizations Falling Behind on Cyber Risk Management | 2018-12-01 | Security Magazine

Healthcare Organizations Falling Behind on Cyber Risk Management | 2018-12-01 | Security Magazine | Enterprise Security News | Scoop.it
Only 29 percent of healthcare organizations reporting having a comprehensive security program in place, and among those that do not have such a program, 31 percent are either not meeting with their executive committee or are meeting less than once a year to give security updates. According to CHIME’s 2018 Health-Care’s Most Wired report, the maturity of a healthcare enterprise’s security program impacts its capabilities and protocols. For example, enterprises with a comprehensive security program are more likely to support critical security measures like data-loss . . .
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

Critical Infrastructure Under Persistent Threat | 2018-12-06 | Security Magazine

Critical Infrastructure Under Persistent Threat | 2018-12-06 | Security Magazine | Enterprise Security News | Scoop.it
The cyber threats facing Industrial Control Systems (ICS) include nation-state attacks, hacktivists, criminals and even trusted insiders. The frequency and ferocity of attacks are growing and continue to pose a major challenge to those ICS practitioners and cybersecurity teams tasked with protecting our critical national infrastructure (CNI). The impact of potential threats to these systems relates to physical processes and can result in downtime of systems causing power, electricity or water outages. Any downtime can affect a plant’s ability to operate, its productivity and availability. . . .
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

The Hitchhiker's Guide to Hacking Connected Cars: Exploitation of a Telematics Control Unit using a Rogue BTS with OTA | LinkedIn

The Hitchhiker's Guide to Hacking Connected Cars: Exploitation of a Telematics Control Unit using a Rogue BTS with OTA | LinkedIn | Enterprise Security News | Scoop.it
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

How AI, IoT, and big data will shape the future of cybersecurity

How AI, IoT, and big data will shape the future of cybersecurity | Enterprise Security News | Scoop.it
There are more connected devices than people on the planet, says IBM Security Vice President Caleb Barlow. We have to shift our thinking now about how we manage device security.
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

Indiana IoT Lab founder: Why IoT initiatives need cybersecurity built in from the start

The Internet of Things increases the risk of cyber attacks. Here's what companies need to do to stay safe, according to John Wechsler, founder of the Indiana IoT Lab.
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

Financial Services in the Ransomware Crosshairs: Why and What to Do | 2018-06-11 | Security Magazine

Financial Services in the Ransomware Crosshairs: Why and What to Do | 2018-06-11 | Security Magazine | Enterprise Security News | Scoop.it
Cybercriminals are leveraging ransomware threats to extort big money from organizations of all sizes in every industry, but financial services organizations are one of today’s primary targets. It is non-negotiable for financial services companies to maintain the privacy of theirs customers and the security of their confidential data. If a bank or credit union is hit with a ransomware attack, significant backlash is undoubtedly going to ensue – especially if customer data is held ransom for a significant amount of time. Why financial services organizations? . . .
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

UTM Dreams Are Made of These - The 3 Major Problems of UTM

more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

What’s needed to ensure safety and security in UAV software

What’s needed to ensure safety and security in UAV software | Enterprise Security News | Scoop.it
UAVs are not like the remote control stunt plane you unwrapped on your 10th birthday. In their different guises they can be found in civil airspace or flying as integral players in military missions. That makes unmanned systems’ safety and security very serious considerations. Accordingly, ISO 14508 and DO-178 could prove helpful in perpetuating safety and security for unmanned systems. Software tools that automate the processes required by these certification standards are easing the burden.
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

Johns Hopkins grad students work to prevent hacking attacks on drones | Hub

Johns Hopkins grad students work to prevent hacking attacks on drones | Hub | Enterprise Security News | Scoop.it
Three cybersecurity grad students work to prevent hacking attacks on drones
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

You Can Hijack Nearly Any Drone Mid-flight Using This Tiny Gadget

You Can Hijack Nearly Any Drone Mid-flight Using This Tiny Gadget | Enterprise Security News | Scoop.it
Hackers can use Icarus box to hack nearly any drone mid-flight, rather than shooting it down.
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

Cognitive Hack: Trust, Deception And Blind Spots

Cognitive Hack: Trust, Deception And Blind Spots | Enterprise Security News | Scoop.it
Cognitive hacks are asymmetric in nature – meaning that the downside of these attacks can significantly outweigh the benefits of risk-taking if not addressed in a timely manner. Because of the asymmetric nature of a cognitive hack, attackers seek the easiest route to gai
more...
No comment yet.