Remove Cyber Risk Remove Digital transformation Remove Information Security
article thumbnail

MY TAKE: Why ‘basic research’ is so vital to bringing digital transformation to full fruition

The Last Watchdog

Basic research is the foundational theorizing and testing scientists pursue in order to advance their understanding of a phenomenon in the natural world, and, increasingly, in the digital realm. Along the way, of course, cybersecurity must get addressed.

article thumbnail

How to find, fund and fix cyber risk blind spots

SC Magazine

Today’s columnist, Sean McDermott of RedMonocle, says that companies should use the NIST 800-53 security and privacy controls to help find cyber risk blind spots. After that, companies need to fund and then fix the security gaps. That’s how many CISOs and security leaders feel in the “find” stage. Credit: NIST.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Agile cryptography is coming, now that ‘attribute-based encryption’ is ready for prime time

The Last Watchdog

Encryption agility is going to be essential as we move forward with digital transformation. All of the technical innovation cybersecurity vendors are churning out to deal with ever-expanding cyber risks, at the end of the day, come down to protecting encrypted data. Refer: The vital role of basic research.

article thumbnail

IATA Cyber Regulations

Centraleyes

Recent amendments have focused on addressing vulnerabilities linked to digital transformation in aviation, such as the use of cloud technologies and IoT devices. What Are the Requirements for IATA Cyber Security Regulations? are typically required to meet IATAs expectations.

Risk 52
article thumbnail

CyberSaint STRONGER 2022 Conference Call for Speakers is Open!

CyberSecurity Insiders

BOSTON–( BUSINESS WIRE )– CyberSaint , the developer of the leading platform delivering cyber risk automation, today announced that the company is seeking speaker submissions for its virtual STRONGER conference, set to occur September 13th-15th 2022. Conference Tracks: Frameworks, Security, & Risk.

article thumbnail

Microsoft mitigated a 3.47 Tbps DDoS attack, the largest one to date

Security Affairs

“In India, another driving factor may be that the acceleration of digital transformation, for example, the “Digital India” initiative 11 , has increased the region’s overall exposure to cyber risks.” ” concludes the report. ” Follow me on Twitter: @securityaffairs and Facebook.

DDOS 98
article thumbnail

Spotlight Podcast: QOMPLX CISO Andy Jaquith on COVID, Ransomware and Resilience

The Security Ledger

In this Spotlight podcast* we’re joined by Andrew Jaquith, the CISO at QOMPLX to talk about how the COVID pandemic is highlighting longstanding problems with cyber risk management and cyber resilience. Andy Jaquith is the Chief Information Security Officer at QOMPLX Inc. Read the whole entry. »

CISO 52