Remove Cyber Attacks Remove Cyber Risk Remove Digital transformation
article thumbnail

GUEST ESSAY: The three horsemen of cyber risks: misinformation, disinformation and fake news

The Last Watchdog

Such a transformation however, comes with its own set of risks. Misleading information has emerged as one of the leading cyber risks in our society, affecting political leaders, nations, and people’s lives, with the COVID-19 pandemic having only made it worse.

article thumbnail

Seeds of Destruction: Cyber Risk Is Growing in Agriculture

The Security Ledger

In this episode of the podcast (#213): Molly Jahn of DARPA and University of Wisconsin joins us to talk about the growing cyber risk to the Food and Agriculture sector, as industry consolidation and precision agriculture combine to increase the chances of cyber disruption of food production. Read the whole entry. »

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RSAC insights: How ‘TPRM’ can help shrink security skills gap — while protecting supply chains

The Last Watchdog

Digital transformation had taken hold; so their timing was pitch perfect. Cyber risks profiling. CyberGRX’s global cyber risk Exchange caught on quickly. The exchange has proven to be a perfect mechanism for fleshing out much richer cyber risk profiles of third-party vendors.

article thumbnail

Spotlight Podcast: OT Is Under Attack. Now What?

The Security Ledger

Chris Walcutt, the CSO at DirectDefense talks about the rapidly changing threat landscape that critical infrastructure owners and operators inhabit, and how savvy firms are managing OT cyber risks. The post Spotlight Podcast: OT Is Under Attack. appeared first on The Security Ledger with Paul F. Click the icon below to listen.

CSO 52
article thumbnail

Episode 163: Cyber Risk has a Dunning-Kruger Problem also: Bad Password Habits start at Home

The Security Ledger

Kevin Richards of the insurer Marsh joins us to talk about that company's Cyber Risk Perceptions Survey. » Related Stories Explained: Two-Factor vs. Multi-Factor Authentication RSA warns Digital Transformation is supercharging Digital Risk Episode 149: How Real is the Huawei Risk?

article thumbnail

The Surge of Identity and Access Management (IAM): Unveiling the Catalysts

Security Boulevard

IAM solutions have emerged as linchpins in mitigating cyber risks, ensuring that only authorized individuals can access sensitive systems and data. Compliance-oriented initiatives have been instrumental in catalyzing the adoption of advanced IAM frameworks to ensure regulatory adherence.

article thumbnail

The Surge of Identity and Access Management (IAM): Unveiling the Catalysts

Thales Cloud Protection & Licensing

IAM solutions have emerged as linchpins in mitigating cyber risks, ensuring that only authorized individuals can access sensitive systems and data. Compliance-oriented initiatives have been instrumental in catalyzing the adoption of advanced IAM frameworks to ensure regulatory adherence.