article thumbnail

MY TAKE: Why ‘basic research’ is so vital to bringing digital transformation to full fruition

The Last Watchdog

Basic research is the foundational theorizing and testing scientists pursue in order to advance their understanding of a phenomenon in the natural world, and, increasingly, in the digital realm. Along the way, of course, cybersecurity must get addressed. Lots of big companies sponsor basic research; it’s how progress gets made.

article thumbnail

NEW TECH: CyberGRX seeks to streamline morass of third-party cyber risk assessments

The Last Watchdog

The firings came as a result of a massive data breach which routed through an HVAC contractor’s compromised account. So they began inundating their third-party suppliers with “bespoke assessments” – customized cyber risk audits that were time consuming and redundant. The key takeaways: Rise of third parties.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: A path for SMBs to achieve security maturity: start small controlling privileged accounts

The Last Watchdog

The challenge of embracing digital transformation while also quelling the accompanying cyber risks has never been greater for small- and mid-sized businesses. Somehow SMBs must keep pace competitively, while also tamping down the rising risk of suffering a catastrophic network breach.

article thumbnail

Episode 179: CISO Eye on the Virus Guy – Assessing COVID’s Cyber Risks

The Security Ledger

In this episode of the podcast (#179), CISO Kayne McGlandry of IEEE joins us to talk about the cyber risks posed by COVID and why COVID-themed phishing emails shouldn’t be your only concern. Also: SMBs Struggle with Identity Spotlight Podcast: How DU Telecom Manages Digital Transformation Risk.

article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

What’s happening is that supply chains are becoming more intricate and far-flung the deeper we move into digital transformation and the Internet of Things. And opportunistic threat actors are proving adept as ever at sniffing out the weak-link third parties in any digital ecosystem. Uphill battle.

article thumbnail

Resolve to fix your Online Security Mess in 2020. Here’s how.

The Security Ledger

We give you seven simple steps to level up your password and account security. » Related Stories Episode 163: Cyber Risk has a Dunning-Kruger Problem Also: Bad Password Habits start at Home RSA warns Digital Transformation is supercharging Digital Risk Passwordless? Read the whole entry. »

article thumbnail

Spotlight Podcast: QOMPLX CISO Andy Jaquith on COVID, Ransomware and Resilience

The Security Ledger

In this Spotlight podcast* we’re joined by Andrew Jaquith, the CISO at QOMPLX to talk about how the COVID pandemic is highlighting longstanding problems with cyber risk management and cyber resilience. Andy is an amazing resource on all matters cyber security. Read the whole entry. » New Tech Meets Old Tools.

CISO 52