Remove 2030 Remove Accountability Remove Technology
article thumbnail

Q&A: Cybersecurity in ‘The Intelligent Era’

IT Security Guru

world, represent perhaps the most disruptive technology to transform IT, our industries and how businesses operate. As technology continues to advance, which ethical considerations do you think will become most pressing? This will catch some business leaders off guard in the next 2-3 years with a 2030 migration deadline looming.

article thumbnail

MY TAKE: How digital technology and the rising gig economy are exacerbating third-party risks

The Last Watchdog

Accounting for third-party risks is now mandated by regulations — with teeth. Addressing third-parties Allen founded The Santa Fe Group in 1995 and established it as a leading consultancy, specializing on emerging technologies. By 2030, 50 percent of employees are expected to be contract workers, Allen noted.

Risk 164
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: As network perimeters shift and ecosystems blend, the role of MSSPs solidifies

The Last Watchdog

In today’s hyper interconnected operating environment, this comes down to parsing and combining multiple legacy and next-gen security technologies tailored to fit the unique needs of the organization. By one estimate, companies are on track to spend $77 billion on MSSP services by 2030, up from $22 billion in 2020.

CISO 244
article thumbnail

Is the Grid Secure Enough for the Electric Vehicle Influx?

IT Security Guru

The primary technology to decarbonize the road transport sector, which accounts for 16% of world emissions , is electric automobiles. The increase in EV sales is pushing investments in vehicle electrification, which accounted for nearly 65% of total investments in the transportation industry in 2021.

article thumbnail

The Five-Step PCI DSS 4.0 Transition Checklist

CyberSecurity Insiders

They also predict this number will reach $408 billion in losses by 2030. is clearly failing to protect cardholder account details effectively in today’s environment. Protect stored account data. Requirement 3: “Account Data” instead of “Cardholder Data” indicates a potential increase of scope for PCI assets. and PCI v4.0:

Antivirus 138
article thumbnail

Can smart cities be secured and trusted?

Thales Cloud Protection & Licensing

It is the year 2030, and you have had another busy day. With this seamless interaction of the latest IoT technologies, “smart cities” are redefining the way we live and work. There’s just one problem…these massive, radical, interconnected technology systems also raise serious privacy and security concerns.

article thumbnail

Cybersecurity Snapshot: Tenable Highlights Risks of AI Use in the Cloud, as UK’s NCSC Offers Tips for Post-Quantum Cryptography Adoption

Security Boulevard

77% of organizations have the overprivileged default Compute Engine service account configured in Google Vertex AI Notebooks which puts all services built on this default Compute Engine at risk. Migration to PQC can be viewed as any large technology transition.

Risk 69