Remove 2022 Remove Authentication Remove Security
article thumbnail

How well did Israel’s cybersecurity industry do in 2022?

TechCrunch

The massive valuations and funding rounds of 2021 left some room for optimism around the state of the Israeli cybersecurity industry in 2022, instilling a sense of security in Q1 of the new year. After closing the book on 2022 this week, it is safe to say that this optimism was somewhat misguided. billion in 2021 to $3.22

Industry 232
article thumbnail

How to implement zero trust device security

CIO

The added demand for remote access to corporate applications driven by business continuity, customer reach, and newfound employee satisfaction comes with a heightened concern over data security. Zero Trust principles are aimed at improving cybersecurity and have been mandated in the federal arena since 2022.

How To 171
article thumbnail

Zero Trust Security for NIS2 compliance: What you need to know

CIO

Over 100,00 organizations are expected to be impacted by Network and Information Security Directive (NIS2) cybersecurity standards that European Union (EU) member states must implement by October 2024. [i] This concept of least-privilege access is fundamental to Zero Trust Security practices.

Security 182
article thumbnail

To better thwart ransomware attacks, startups must get cybersecurity basics right

TechCrunch

The Department of Justice (DOJ) famously declared 2021 as the “worst year” for ransomware attacks, but it seems that title could be in 2022’s hands very soon. Enable multi-factor authentication on everything you have. Katie Moussouris, founder of Luta Security.

article thumbnail

More connected, less secure: Addressing IoT and OT threats to the enterprise

CIO

It also introduces new security challenges that demand our attention, especially as IoT is integrated into operational technology (OT) environments. 6 IoT vulnerabilities to watch out for Security risks are a significant concern for businesses using LoT and OT technology.

IoT 306
article thumbnail

Robust remote access security for the utilities sector advances with Zero Trust

CIO

Cyberattacks on utilities more than doubled from 2020 to 2022. It’s likely the case that the rapid growth of connected assets is outstripping security capabilities. Security and IT leaders at utilities should consider a Zero Trust approach as they confront this threat. This can make securing utilities especially challenging.

Security 162
article thumbnail

MedCrypt lands $25M injection to secure vulnerable medical devices

TechCrunch

But while these devices are helping healthcare providers automate workflows and reduce the risk of error, common security vulnerabilities found in these devices are also endangering patients. These devices all suffer from three common problems, Kijewski tells TechCrunch: outdated software, user authentication and a lack of good cryptography.