Remove Cyber Insurance Remove Energy and Utilities Remove Technology
article thumbnail

State of Cybersecurity in Canada 2025: Key Insights for InfoSec Leaders

SecureWorld News

It is also a celebration of Canadian thought leadership on very important business and technology topics that are directly impacting Canadians quality of life as well as their pocketbooks." Key findings: the cyber threat landscape in 2025 1. Leverage cyber insurance to mitigate financial risks associated with supply chain attacks.

InfoSec 70
article thumbnail

Scanning for Flaws, Scoring for Security

Krebs on Security

companies with the Cyber Risk Score, and then invited these companies to sign up and see how their score compares with that of other organizations in their industry. The stated use cases for the Cyber Risk Score include the potential for cyber insurance pricing and underwriting, and evaluating supply chain risk (i.e.,

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity threats: what awaits us in 2023?

SecureList

The economic downturn (caused by energy prices, inflation, sanctions, etc.) will lead more people to poverty, which always translates to increased criminality (cyber or otherwise), and we know ransomware to be extremely profitable. Stefan Soesanto, Senior Cyber Defense Researcher, The Center for Security Studies (CSS) at ETH Zürich.

article thumbnail

The Ongoing Cyber Threat to Critical Infrastructure

Thales Cloud Protection & Licensing

The threat of attacks against Critical National Infrastructure (CNI) – energy, utilities, telecommunications, and transportation – is now front of mind for many. From the ransomware attack that compromised a major U.S. gas pipeline in 2021 to the rise of nation-state attacks, critical infrastructure organizations are under siege.

article thumbnail

What we’ve learned from the Colonial Pipeline cyberattack, and what to do about it

SC Magazine

Technological obsolescence. As cybercriminals seek opportunities for extortion, our reliance on emerging technology makes our critical infrastructure highly vulnerable based on its enormous attack surface area. Many ICS environments operate with obsolete technology that’s patched infrequently if at all.

article thumbnail

Securing the Clean Energy Cyber Supply Chain: U.S. DOE's New Framework

SecureWorld News

Department of Energy's Office of Cybersecurity, Energy Security, and Emergency Response (CESER) has taken a significant step forward in bolstering the cybersecurity of America's energy sector. The G7 will work to establish a collective cybersecurity framework for operational technologies for both manufacturers and operators."

article thumbnail

LW ROUNDTABLE: Lessons learned from the headline-grabbing cybersecurity incidents of 2024

The Last Watchdog

A conservative approach focusing on proven solutions over untested technologies is key to mitigating these evolving threats Ventura Jeremy Ventura , Field CISO, Myriad360 Cybersecurity incidents in 2024 highlighted the rising threat of third-party supply chain attacks, emphasizing the need for vendor visibility and risk assessments.