Remove Blog Remove Cyber threats Remove Digital transformation
article thumbnail

GUEST ESSAY: The three horsemen of cyber risks: misinformation, disinformation and fake news

The Last Watchdog

We need to pay attention to the quality of information disseminated into the world, now more than ever, as spreading misinformation has become a lot easier with the advent of digital transformation. My research attempts to bridge the divide between academic research and real-world practice of cyber risk management.

article thumbnail

SHARED INTEL: Poll highlights the urgency to balance digital resiliency, cybersecurity

The Last Watchdog

The pace and extent of digital transformation that global enterprise organizations have undergone cannot be overstated. At the same time, digital resilience has arisen as a top priority for enterprises across all sectors, especially as cyber threats continue to accelerate. Cyber threats impact.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Encryption Became the Board’s New Best Friend

Thales Cloud Protection & Licensing

In just the past few years (and hundreds of high-profile breaches and £Trillions of economic damage later), cyber threats became impossible for the boardroom to ignore. The digital transformation conundrum. For many years, encryption has been viewed as a burden on businesses – expensive, complex and of questionable value.

article thumbnail

The Digital Trust Factor. Have We Got It All Wrong?

Jane Frankland

Whether it’s through its cybersecurity and risk management solutions or Identity capabilities, Mastercard’s innovative technologies and industry standards are creating a secure environment for seamless and trustworthy digital transactions.

article thumbnail

5 IT security strategies that you should think about as employees return to the office

CyberSecurity Insiders

This blog was written by an independent guest blogger. Without a doubt, digital transformation accelerated amid the pandemic and made it possible for employees to work remotely. As remote working becomes the new norm, it is paramount to have an agile infrastructure and team for security.

article thumbnail

GUEST ESSAY: How stealth, persistence allowed Wipro attacker to plunder supply chain

The Last Watchdog

The recent network breach of Wipro , a prominent outsourcing company based in India, serves as a stunning reminder that digital transformation cuts two ways. About the essayist: Chris Gerritz is the co-founder and CPO of Infocyte , a pioneer in forensics-based proactive cyber threat detection and instant incident response. .

article thumbnail

The Crucial Role of Cyber Essentials in the UK Public Sector

Heimadal Security

The United Kingdom’s public sector is undergoing a digital transformation, relying increasingly on technology to enhance service delivery, streamline operations, and foster improved engagement with citizens.