article thumbnail

GUEST ESSAY: The three horsemen of cyber risks: misinformation, disinformation and fake news

The Last Watchdog

Such a transformation however, comes with its own set of risks. Misleading information has emerged as one of the leading cyber risks in our society, affecting political leaders, nations, and people’s lives, with the COVID-19 pandemic having only made it worse.

article thumbnail

Spotlight Podcast: RSA President Rohit Ghai warns Digital Transformation is magnifying Enterprise Risk

The Security Ledger

In this interview, recorded at the RSA* Charge conference, RSA President Rohit Ghai talks about some of the ways that digital organizations have to adapt to- and address risks introduced by new transformative technologies like machine learning, multi cloud environments and robotics and other "digital transformation" initiatives.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spotlight Podcast: Managing the Digital Risk in your Digital Transformation

The Security Ledger

Companies are pursuing digital transformation at all costs. But do they really understand the risks lurking in their digital transformation strategies? Companies are pursuing digital transformation at all costs. Re-Thinking Cyber Risk. The post Spotlight Podcast: Read the whole entry. »

article thumbnail

Spotlight Podcast: RSA CTO Zulfikar Ramzan on confronting Digital Transformation’s Dark Side

The Security Ledger

In this Spotlight Edition of the podcast we're speaking with RSA Chief Technology Officer Zulfikar Ramzan about how his company is adapting to help its customers confront the dark side of digital transformation initiatives: increased digital risk, including from cloud, artificial intelligence and the Internet of Things.

article thumbnail

Time to Accept the Risk of Open Source?

Security Boulevard

Artificial intelligence, machine learning, blockchain, and quantum computing reduce risk. What is the True Risk of Open-source Libraries? That depends on the source components, exposure to code injections from malicious actors, and other cyber risks from hackers. Is secure open-source today?

Risk 109
article thumbnail

How the CISO has adapted to protect the hybrid workforce

IT Security Guru

Given the connectivity needs of a remote workforce – and knowing a hybrid workforce is here to stay – many IT teams have had to make sudden changes in the way workers connect to corporate systems that could introduce new cyber risks and vulnerabilities. . Other security initiatives to leverage .

CISO 97
article thumbnail

Protecting your Customers and Brand in 2022: Are you doing enough?

Jane Frankland

Nowadays, organisations need digital leaders such as CIOs, CISOs, and CTOs who are strategists, visionaries, and know how to manage, effectively. The pressure for those in charge is immense as cyber risks have scaled, and can now bring businesses, economies, and communities to a halt. The digital skills gap comes at a cost.

CISO 130