article thumbnail

Luna HSMs FIPS 140-3 Validation

Thales Cloud Protection & Licensing

Security standards, like technology, are always evolving, making compliance challenging for customers and vendors alike. A change in technology that is. FIPS 140-3 is more closely aligned to international standards and better suited to today's technologies. Why did they change something like a compliance standard?

Firmware 133
article thumbnail

RSAC Fireside Chat: Turning full attention to locking down the security of ‘open source’

The Last Watchdog

Open source coding has come to dominate business software applications; rising to comprise 75 percent of audited code bases and putting open source on a trajectory to become a $50 billion subsector of technology by 2026. For a full drill down on our conversation please give the accompanying podcast a listen.

Software 163
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

International Association of Chiefs of Police (IACP) Appoints CyberSecurity Expert Witness Joseph Steinberg To Computer Crime & Digital Evidence Committee

Joseph Steinberg

Steinberg, who is based in New York, is expected to serve on the committee through mid-2026. The IACP is the publisher of The Police Chief magazine, the leading periodical for law enforcement executives, and the host of the IACP Annual Conference, the largest police educational and technology exposition in the world.

article thumbnail

Italy announced its National Cybersecurity Strategy 2022/26

Security Affairs

“The ongoing evolution of technology that has shaped our current society keeps raising new risks as it continues to develop, along with most sophisticated attack techniques. The document remarks that cybersecurity is an essential investment and an enabling factor for the development of the national economy and industry.

article thumbnail

GUEST ESSAY: Robust data management can prevent theft, guard intellectual property

The Last Watchdog

Another example of on-the-ground tactics includes Intelligence agencies exploiting graduate students at research universities to access sensitive materials and coercing professionals working on sensitive technologies to engage in activities like IP theft. About the essayist: Clark Frogley is Head of Financial Crime Solutions at Quantexa.

Risk 191
article thumbnail

NEW TECH SNAPSHOT: The role of ‘MSSPs’ in helping businesses manage cybersecurity

The Last Watchdog

The global market for managed security services is estimated to be growing at a compound annual rate of 14 percent and should climb to $44 billion by 2026 , up from $23 billion in 2021, says research firm MarketsandMarkets.

article thumbnail

2024 Tech and Cybersecurity Forecast: Navigating New Frontiers in Business

Thales Cloud Protection & Licensing

In an era where technology evolves at a blistering pace, business leaders must stay ahead of the curve. Quantum Computing and Its Business Impact Quantum computing stands at the forefront of technological evolution, poised to redefine the boundaries of processing power and problem-solving. The same is true for today’s business leaders.