Remove Cyber Risk Remove Digital transformation Remove InfoSec
article thumbnail

Seeds of Destruction: Cyber Risk Is Growing in Agriculture

The Security Ledger

In this episode of the podcast (#213): Molly Jahn of DARPA and University of Wisconsin joins us to talk about the growing cyber risk to the Food and Agriculture sector, as industry consolidation and precision agriculture combine to increase the chances of cyber disruption of food production. Read the whole entry. »

article thumbnail

CyberSaint STRONGER 2022 Conference Call for Speakers is Open!

CyberSecurity Insiders

BOSTON–( BUSINESS WIRE )– CyberSaint , the developer of the leading platform delivering cyber risk automation, today announced that the company is seeking speaker submissions for its virtual STRONGER conference, set to occur September 13th-15th 2022. Conference Tracks: Frameworks, Security, & Risk. InfoSec 360.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spotlight Podcast: RSA CTO Zulfikar Ramzan on confronting Digital Transformation’s Dark Side

The Security Ledger

In this Spotlight Edition of the podcast we're speaking with RSA Chief Technology Officer Zulfikar Ramzan about how his company is adapting to help its customers confront the dark side of digital transformation initiatives: increased digital risk, including from cloud, artificial intelligence and the Internet of Things.

article thumbnail

Taking a Proactive Approach to Mitigating Ransomware Part 1: You Can’t Neglect the Application Layer

Security Boulevard

The proliferation of attacks - 66% of organizations were hit in the past year - and the ability for threat actors to more easily execute these attacks at scale, makes ransomware “ arguably the biggest cyber risk facing organizations today.” The problem is putting those strategies into practice is easier said than done.

article thumbnail

Cyber CEO: A Look Back at Cybersecurity in 2021

Herjavec Group

For cyber actors, it’s a lucrative cyber attack option that can be delivered in various ways. On top of this, the consequences of rapid digital transformation due to the COVID-19 Pandemic created the perfect storm for successful ransomware attacks. I truly believe that your people are your first line of defense.

article thumbnail

Cyber CEO: The Cybersecurity Skills Gap – How to Address it Now and in the Future

Herjavec Group

The cybersecurity skills gap has continued to be a problem – one that’s only gotten worse due to the pandemic and digital transformation that most organizations recently experienced. Ask them for a quick virtual coffee or phone call, get out to the many infosec events, and engage with the community !

article thumbnail

Top Breach and Attack Simulation (BAS) Vendors

eSecurity Planet

Breach and attack simulation (BAS) is a relatively new IT security technology that can automatically spot vulnerabilities in an organization’s cyber defenses, akin to continuous, automated penetration testing. DXC Technology has over 40 years of infosec experience, most of which as HPE’s Enterprise Services. DXC Technology. SafeBreach.