article thumbnail

MY TAKE: How digital technology and the rising gig economy are exacerbating third-party risks

The Last Watchdog

Accounting for third-party risks is now mandated by regulations — with teeth. Allen is a widely respected thought leader on this topic, having launched Shared Assessments in 2005 as an intel-sharing and training consortium focused on third-party risks. That out of the way, business can proceed with less risk.

Risk 164
article thumbnail

How 5G Operators Can Prepare for The Quantum Era

Thales Cloud Protection & Licensing

This expansion and significant architectural changes will create highly complex networks, exposing new vulnerabilities and more significant risks as we move towards a post-quantum (PQ) world. However, many of these protocols are at risk due to their vulnerability to quantum attacks. Figure 1: PQC Migration.

Mobile 71
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Can smart cities be secured and trusted?

Thales Cloud Protection & Licensing

It is the year 2030, and you have had another busy day. Balancing the promise against the potential of cyber risks of smart cities will be critical to realizing their potential. Panic sets in, but you push past it and put a plan into motion. To pick your daughter up from school, you call a driverless car.

article thumbnail

Attack of drones: airborne cybersecurity nightmare

Security Affairs

There exists a class of tiny and highly maneuverable devices that introduce a variety of cybersecurity risks you probably haven’t considered before. According to research firm Statista, the global retail drone market is expected to reach $90 billion by 2030, with Defense, Enterprise, and Logistics being the primary industries driving growth.

article thumbnail

Office 365 Backup Solutions: Security, Functionality & UI/UX

Spinone

In 2030, your client complains about your product, a piece of equipment for a spaceship that malfunctioned during its second mission to Venus. It’s a set of rules and configurations applied to your data for it to remain unchanged. In theory, it can be used as a backup. Here’s an example.

Backups 40
article thumbnail

Security Roundup July 2023

BH Consulting

The 51-page report goes into detail on the threat landscape, risks to key sectors and supply chain risks. Cyber Ireland, the industry body, forecasts that cybersecurity jobs will increase to 17,000 by 2030. MORE The UK NCSC has updated its risk management toolbox, a free guide. Courses will start in September.

article thumbnail

The Challenges Facing the Passwordless Future

eSecurity Planet

billion by 2030 — a stunning 2,000% in less than a decade. According to Dhapte, even if some consumers can afford a new device, websites will not remove all password authentication because they risk losing other users. The risk of misuse is significant. The passkey market size in 2021 was $158.7 Awaiting the future.

Passwords 115