article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 3)

The Last Watchdog

Here’s the final installment of leading technologists sharing their observations about cybersecurity developments in the year that’s coming to a close — and the year to come. For now, AI is the copilot and humans remain irreplaceable in the cybersecurity equation.

article thumbnail

Key Cybersecurity Trends for 2024: My Predictions

Jane Frankland

Cybersecurity can often feel like a game of cat and mouse where cyber attackers and defenders engage in a chase, with one party trying to outsmart the other. The proliferation of IoT devices and sensors will accelerate, allowing organisations to collect and leverage data for improved operational efficiency and real-time monitoring.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 ways to strengthen healthcare cybersecurity

Webroot

Why healthcare needs better cybersecurity Healthcare organizations are especially vulnerable to data breaches because of how much data they hold. Here are five ways to strengthen your cybersecurity: 1. Provide cybersecurity training According to Verizon, 82 percent of all breaches involve a human element.

article thumbnail

Why Access Control Should Be a Core Focus for Enterprise Cybersecurity

CyberSecurity Insiders

In the case of those organisations focused on the implementation of zero-trust architectures, for example, manually processing the growing number of entitlements is – for many – no longer sustainable. Indeed, dynamic authorisation is increasingly viewed as a prerequisite for delivering effective zero-trust architectures.

article thumbnail

News Alert: GhangorCloud selected to demo Deep AI-based capabilities at India’s G20 Summit

The Last Watchdog

This is a mega-summit as The Group of Twenty (G20) is the premier forum for international economic cooperation, and plays an important role in shaping and strengthening global architecture and governance on all major international economic issues. San Jose, Calif.,

article thumbnail

GUEST ESSAY: Securely managing access controls is vital to preserving the privacy of healthcare data

The Last Watchdog

However, M&A is a complex undertaking, and integrating and consolidating IT, cybersecurity and data privacy infrastructure only adds to the challenge. Patient data exposures. Healthcare data security and privacy is a problem that continues to grow.

article thumbnail

Understanding AI risks and how to secure using Zero Trust

CyberSecurity Insiders

Zero Trust is an effective strategy for dealing with AI threats for the following reasons: Zero Trust architecture: Design granular access controls based on least privilege principles. Each AI model, data source, and user is considered individually, with stringent permissions that limit access only to what is necessary.

Risk 106