Remove sponsor
article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Byron: Since I started, the cyber threat landscape has grown exponentially, with more sophisticated attacks and diverse attackers ranging from individual hackers to professional criminal rings to state-sponsored entities. Erin: What role should governments play in combating cybercrime?

article thumbnail

Episode 168: Application Security Debt is growing. Also: Web App Security in the Age of IoT

The Security Ledger

In this week’s episode of the podcast (#168), sponsored by Signal Sciences, Chris Eng of Veracode joins us to talk about the 10th annual State of Software Security Report and the problem of application security debt. ZestAI’s Quest to make Artificial Intelligence Explainable Episode 164: Who owns the Data Smart Cars collect?

IoT 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Episode 168: Application Security Debt is growing and Securing Web Apps in the Age of IoT

The Security Ledger

In this week’s episode of the podcast (#168), sponsored by Signal Sciences, Chris Eng of Veracode joins us to talk about the 10th annual State of Software Security Report and the problem of application security debt. ZestAI’s Quest to make Artificial Intelligence Explainable Episode 164: Who owns the Data Smart Cars collect?

IoT 40
article thumbnail

Cybersecurity threats: what awaits us in 2023?

SecureList

Supply-chain will become more of a sweet spot for targeted ransomware and state-sponsored espionage campaigns. State-sponsored attacks will remain high in the threat landscape however, with no ease of geopolitical tensions with Russia, China, North Korea, and Iran in sight. IoT Vulnerabilities.

article thumbnail

Cybersecurity in 2022, Predictions for digital ecosystem facing more challenges and sophisticated threats

CyberSecurity Insiders

Also, that threat actors, especially state-sponsored, and criminal enterprises would take advantage of the expanding cyber-attack surface by using their resources to employ more sophisticated means for discovering target vulnerabilities, automating phishing, and finding new deceptive paths for infiltrating malware. OT/IT and IoT convergence.

article thumbnail

STEPS FORWARD: Math geniuses strive to make a pivotal advance — by obfuscating software code

The Last Watchdog

Our top math geniuses point to iO as a cornerstone needed to unleash the full potential of artificially intelligent (AI) programs running across highly complex and dynamic cloud platforms, soon to be powered by quantum computers. The math community refers to this bottleneck as “indistinguishability obfuscation,” or iO.

Software 182
article thumbnail

Annual Reports: How They Warn of Cyber Risk

SecureWorld News

To date these incidents have not had a material impact on our or our clients’ operations; however, there is no assurance that such impacts will not be material in the future, and such incidents have in the past and may in the future have the impacts discussed below.