article thumbnail

Jio showcases enablement of secure IoT over Blockchain platform

TM Forum

The networks they provide must be secured by encryption to protect anonymity and be tamper proof to reduce the perceived threat to operational assets, transaction attributes, and users’ data flowing between machines or machines and the network. The platform can ingest, process and store hundreds of petabytes of data.

Security 130
article thumbnail

NASA Audit: Cyber Risk Skyrockets with 'Work from Home'

SecureWorld News

The Agency's cybersecurity challenges are further exacerbated by the number and variety of IT devices at NASA and the sheer volume of data the Agency maintains.". In 2018, an account belonging to an external user was compromised and used to steal approximately 500 megabytes of data from a major mission system.".

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Endpoint Imperative: The Perimeter is Dead; Long Live the Perimeter!

Cloud Musings

The result: Higher productivity, but bigger challenges for security, data protection, and mobile device management. Jackson and Intel’s Yasser Rasheed explore the new normal for security, with a focus on the end users. Attack the end users, grab the data, steal the data or lock it in and ask for ransom.

article thumbnail

Fixmo Announces Expanded Collaboration with Samsung, Enhanced Support for Samsung KNOX Secure Mobile Platform

CTOvision

“The KNOX platform continues to set the bar for mobile security in enterprise and government. With our new EMM product, we are expanding our mobile security and management offerings with easy-to-use, cloud-based, mobile device management capabilities. About Fixmo.

Mobile 242
article thumbnail

Averting turbulence in the air

CIO Business Intelligence

The diversification of payment methods and gradual increase in the volume of online transactions have cast a spotlight on the need for payment security compliance within the airline industry. With the new, recently onboarded Payment Card Industry Data Security Standard (PCI DSS) v4.0, Well not exactly. The PCI DSS v4.0,

article thumbnail

The BYOD Problem

Cloud Musings

To an employer, however, that smart device is nothing more than a dagger posed to rip apart every shred of corporate security. This reality of modern business was highlighted by the Information Security Community on LinkedIn through their 2016 Spotlight Report on “Bring Your Own Device” (BYOD).

Mobile 70
article thumbnail

Penetration Testing Remote Workers

SecureWorld News

Personal email addresses that may be on the same BYOD (Bring Your Own Device) assets. These are off limits regardless of where the BYOD is located, and organizations should use a Mobile Device Management (MDM) solution to provide email segmentation and data management.

Social 90