Jack Jones
SCCISP Campus Cyber Security Maritime Certification
Un Dolor De Cabeza Llamado Ransomware
How to hack CCTV systems!
The Case for Open FAIR – The Open Group FAIR Risk Management
The IoTSI Facilitator
Kaspersky: Attacks on IoT devices double in a year
Trend Micro and Fujitsu set out to secure connected vehicles
With the industry’s broadest portfolio of consulting and global managed security services, IBM Security™ Services can help you quantify and prioritize your risks. Our professionals deliver industry-leading assessments and security strategies to many of the world’s largest enterprises, including critical strategies such as zero trust. As a trusted advisor, IBM Security Services can extend your team, help detect and respond to threats, and unify your organization on security priorities to accelerate business transformation.
Smart Cities and Communities Challenge.
developing and implementing Smart Cities and Smart City solutions and
capabilities, particularly as it pertains to cybersecurity and privacy. While this
Guidebook is largely based on the National Institute of Standards and Technology’s
(NIST) Risk Management Framework (RMF), the Guidebook is not intended to
obviate any existing cybersecurity and privacy risk management practices, policies,
or processes. Rather, it is intended to supplement existing practices, policies, and
processes and provide some Smart City-specific cybersecurity and risk
management considerations.
Smart cities will be a target for hackers, and councils need to be prepared, the National Cyber Security Centre (NCSC) has warned. Sensors and internet-connected devices may improve urban services, but could also be used by hackers and foreign states to disrupt or spy.
Enhancing Cyber Resilience in Electricity Systems
Hello everyone , Bangalore all set for Threat Hunting session with Guest Speaker Arpan Raval
Registration Link - https://rb.gy/imqa12
Learn Safe- Work Safe -Stay Safe - IoTSI launches virtual meeting service for Local Chapters.
In these difficult times it is difficult if not impossible, to meetup face to face and discuss industry challenges and opportunities. IoTSI Virtual meetings enables IoTSI Chapter Leaders the opportunity to run online chapter meetings and continue the conversation. Chapter leaders who would like utilise this service please send me a message and we will onboard your IoTSI Local Chapter.
Vulnerabilidades más explotadas durante el 2019 por los cybercriminales:
https://www.helpnetsecurity.com/2020/02/06/most-exploited-vulnerabilities-2019/
Hi everyone
Today we will be present with Eduardo Castillo journalist from CNN in Spanish Chile on his radio program on TXS talking about the IoT Security Institute chapter Chile, its creation, all the progress being made and the next steps of the chapter in the region.
IOT Security and Government action.
The recent legislation by the British Government for a new Cyber Law which requires that all manufacturers of IOT devices comply with the following:
1. All IOT passwords must be unique.
2. Manufacturers Must Be Easily Contactable to enable buyers to report vulnerabilities.
3. Manufacturers Must Inform Customers Of The Device’s “Lifespan” over which it will receive security updates.
The threat posed by IOT devices will only be addressed when the manufacturers perceive the importance of good security.
Whilst this does not address the myriad of security issues within the IOT domain, I believe that it is a start.
Thoughts?
Cyber attackers don’t wait—deploying technologies at a faster pace than securing them can open up an internet of threats
It is with great pleasure that the IoTSI awards Muhammad Khurram Khan the SCCISP Certification.
Mr Khan is a leader among leaders within the field of cyber security. His work at the Center of Excellence in Information Assurance (CoEIA) is well documented and closely followed by cyber industry professionals. It is an honour to welcome him to the IoTSI as a certified SCCISP.
Congratulations Argyris!
No subscriptions found!