article thumbnail

MY TAKE: Agile cryptography is coming, now that ‘attribute-based encryption’ is ready for prime time

The Last Watchdog

Encryption agility is going to be essential as we move forward with digital transformation. And since 2005 or so, one area of focus has been on sharpening the math formulas that make attribute-based encryption possible. Refer: The vital role of basic research.

article thumbnail

MY TAKE: A path for SMBs to achieve security maturity: start small controlling privileged accounts

The Last Watchdog

The challenge of embracing digital transformation while also quelling the accompanying cyber risks has never been greater for small- and mid-sized businesses. Here are the key takeaways: Lower-tier hacks. The ongoing waves of Microsoft Exchange ProxyLogon hacks are a good example of these lower-tier attacks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: How digital technology and the rising gig economy are exacerbating third-party risks

The Last Watchdog

What does this mean for company decision makers, going forward, especially as digital transformation and expansion of the gig economy deepens their reliance on subcontractors? Those can be hacked and present ways to come into a system,” Allen told me. • To hear the full interview, please give the accompanying podcast a listen.

Risk 164
article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

What’s happening is that supply chains are becoming more intricate and far-flung the deeper we move into digital transformation and the Internet of Things. And opportunistic threat actors are proving adept as ever at sniffing out the weak-link third parties in any digital ecosystem.

article thumbnail

The Hacker Mind Podcast: The Fog of Cyber War

ForAllSecure

It’s about challenging our expectations about the people who hack for a living. Mikko had read some of my reporting on Netsky, which Skynet backwards, a virus also known as Sasser, was a typical virus-of-the-day back in 2005. So if a company doesn't get hacked, no one knows if a company gets hacked, it's headline news.