article thumbnail

LW ROUNDTABLE — How 2024’s cyber threats will transform the security landscape in 2025

The Last Watchdog

Dunham Ken Dunham , Cyber Threat Director, Qualys Threat Research Unit Nation-state attacks and cloud compromises with long dwell times are rising as security lags behind post-Covid digital transformation. While cloud offers flexibility, it introduces new cyber risks. million (NIST, WEF).

article thumbnail

GUEST ESSAY: The three horsemen of cyber risks: misinformation, disinformation and fake news

The Last Watchdog

Such a transformation however, comes with its own set of risks. Misleading information has emerged as one of the leading cyber risks in our society, affecting political leaders, nations, and people’s lives, with the COVID-19 pandemic having only made it worse.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Spread Betting Platforms Safeguard Traders Against Cyber Risks

IT Security Guru

If these cyber attacks are successful, even just a little, they could lead to billions of pounds in damages and losses to the companies that own the platforms and the traders. So, lets explore how spread betting platforms are rising to this challenge and ensuring that their platforms are cyber risk-free.

article thumbnail

GUEST ESSAY: New SEC rules aim to help C-levels, board members quantify cyber risks

The Last Watchdog

Securities and Exchange Commission (SEC) is taking steps to crack down on insufficient cyber risk reporting. Related : Making third-party risk audits actionable. Worryingly, threats are beginning to outpace organizations’ ability to effectively prevent and respond to them. Fostering understanding.

article thumbnail

The March Madness Cyber Threat

Adam Levin

It’s just as easy to access a brackets spreadsheet or document through Google Docs or Microsoft Office as it is to send an email attachment, and it poses less of a cyber risk. The post The March Madness Cyber Threat appeared first on Adam Levin. Use online or cloud-based office software for non-sensitive documents.

article thumbnail

GUEST ESSAY: Rising cyber risks make business intelligence gathering more vital than ever

The Last Watchdog

The Ukraine-Russia war is a grim example of geopolitical risk intersecting with cyber security risk. Would this conflict spill into cyber space and what could that look like? Would this conflict spill into cyber space and what could that look like? Risk, including cyber risk, cannot be viewed in isolation.

article thumbnail

GUEST ESSAY: Leveraging DevSecOps to quell cyber risks in a teeming threat landscape

The Last Watchdog

In today’s digital landscape, organizations face numerous challenges when it comes to mitigating cyber risks. Related: How AI is transforming DevOps The constant evolution of technology, increased connectivity, and sophisticated cyber threats pose significant challenges to organizations of all sizes and industries.