Remove 2030 Remove Cyber Risk Remove Encryption
article thumbnail

Q&A: Cybersecurity in ‘The Intelligent Era’

IT Security Guru

Verified Identity, access permission controls, data encryption are all challenges for the cybersecurity industry in a world of autonomous machines! Therefore, the cybersecurity community must upskill in network security, threat detection, post-quantum ready encryption, and uncovering vulnerabilities to minimise zero-day scenarios.

article thumbnail

Can smart cities be secured and trusted?

Thales Cloud Protection & Licensing

It is the year 2030, and you have had another busy day. Balancing the promise against the potential of cyber risks of smart cities will be critical to realizing their potential. Panic sets in, but you push past it and put a plan into motion. To pick your daughter up from school, you call a driverless car.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Snapshot: Tenable Highlights Risks of AI Use in the Cloud, as UK’s NCSC Offers Tips for Post-Quantum Cryptography Adoption

Security Boulevard

And get the latest on open source software security; cyber scams; and IoT security. 1 - Tenable: Orgs using AI in the cloud face thorny cyber risks Using AI tools in cloud environments? Make sure your organization is aware of and prepared for the complex cybersecurity risks that emerge when you mix AI and the cloud.

Risk 69
article thumbnail

Security Roundup July 2023

BH Consulting

The 51-page report goes into detail on the threat landscape, risks to key sectors and supply chain risks. Cyber Ireland, the industry body, forecasts that cybersecurity jobs will increase to 17,000 by 2030. MORE The UK NCSC has updated its risk management toolbox, a free guide. Courses will start in September.

article thumbnail

Trade Wars: How U.S. Tariffs Are Reshaping Cyber Risk and Resilience

SecureWorld News

Additionally, China dominates the supply of rare-earth minerals used in semiconductors, networking equipment, and encryption hardware. These tariffs will create real cyber risks. At the same time, nation-states may launch more cyberattacks as payback," said Kip Boyle , vCISO, Cyber Risk Opportunities LLC.