Remove Architecture Remove Cyber Risk Remove Engineering
article thumbnail

LW ROUNDTABLE — How 2024’s cyber threats will transform the security landscape in 2025

The Last Watchdog

Chearis Karsten Chearis , US Security Sales Engineer Team Lead, XM Cyber Resiliency involves four stages, while compromise has three phases: about to be compromised, compromised, and recovering. While cloud offers flexibility, it introduces new cyber risks.

article thumbnail

Google's AI Trends Report: Key Insights and Cybersecurity Implications

SecureWorld News

One of the report's most pressing concerns is the role of Generative AI in social engineering attacks. From the report: "Generative AI is being used to create highly convincing phishing emails, fake voices, and even deepfake videosmaking social engineering attacks more difficult to detect.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Space: The Final Cybersecurity Frontier

SecureWorld News

Ground stations, increasingly cloud-based to improve flexibility and scaling, expose critical command and telemetry systems to the same cyber risks that plague data centers on Earth. Components are sourced worldwide and must transit multiple hands before launch, risking the injection of backdoors or tampered code.

article thumbnail

Microsoft's Majorana 1 and the Path to Scalable Quantum Computing

SecureWorld News

Unlike previous quantum architectures that rely on fragile qubits prone to errors, Majorana 1 introduces topological qubits, leveraging a new class of materialdubbed topoconductorsto create a more stable and scalable system. Majorana-based qubits are inherently more stable, reducing error correction overhead.

article thumbnail

MY TAKE: Why companies had better start taking the security pitfalls of API proliferation seriously

The Last Watchdog

That said, APIs are certain to get a lot more attention by security teams — and board members concerned about cyber risk mitigation — in 2022. Legacy security architectures just don’t fit this massively complex, highly dynamic environment. Related: ‘SASE’ framework extends security to the network edge.

article thumbnail

AI in the Enterprise: Key Findings from the ThreatLabz 2025 AI Security Report

Security Boulevard

In the 2025 AI Security Report, ThreatLabz delves into evolving risks of AI, including:Shadow AI and data leakage: Key questions enterprises should consider to control unauthorized use of AI tools that may expose sensitive data.AI-generated

article thumbnail

GUEST ESSAY: A call for immediate, collective action to stem attacks on industrial control systems

The Last Watchdog

In the year since this attack, the industry has taken a step forward in cyber preparedness. We see plant asset owners addressing cyber risks with more vigilance, and vendors hardening their solutions with cybersecurity built directly into the product offer. These are important and positive steps. The role of standards.