Remove Blog Remove Cyber threats Remove Digital transformation
article thumbnail

Krispy Kreme Cyber Attack a Wake-Up Call for the Food Industry

SecureWorld News

The shift to digital experiences and customer service in industries that were historically only brick-and-mortar underscores how rapid digital transformation expands the attack surface for cybercriminals. All the new points of sale (POS) and customer touchpoints increase the access points that bad actors can exploit.

article thumbnail

The C-Suite Power Shift: Why CIOs, CTOs, and CISOs Must Realign to Survive

Jane Frankland

Today, the Chief Technology Officer (CTO) and Chief Information Security Officer (CISO) are rising in prominence—fuelled by the accelerating demands of AI innovation, cybersecurity, and digital transformation. That’s what this blog is all about.

CISO 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: The three horsemen of cyber risks: misinformation, disinformation and fake news

The Last Watchdog

We need to pay attention to the quality of information disseminated into the world, now more than ever, as spreading misinformation has become a lot easier with the advent of digital transformation. My research attempts to bridge the divide between academic research and real-world practice of cyber risk management.

article thumbnail

SHARED INTEL: Poll highlights the urgency to balance digital resiliency, cybersecurity

The Last Watchdog

The pace and extent of digital transformation that global enterprise organizations have undergone cannot be overstated. At the same time, digital resilience has arisen as a top priority for enterprises across all sectors, especially as cyber threats continue to accelerate. Cyber threats impact.

article thumbnail

SLED Cybersecurity Threats in 2025: What You Need to Know to Stay Ahead

Security Boulevard

While digital transformations have given state, local, and education (SLED) organizations unprecedented operational flexibility, threat actors are looking to exploit their new vulnerabilities. A virtual frontline has formed, and cybersecurity measures must defend against a rising tide of cyber threats.

article thumbnail

How Encryption Became the Board’s New Best Friend

Thales Cloud Protection & Licensing

In just the past few years (and hundreds of high-profile breaches and £Trillions of economic damage later), cyber threats became impossible for the boardroom to ignore. The digital transformation conundrum. For many years, encryption has been viewed as a burden on businesses – expensive, complex and of questionable value.

article thumbnail

The Crucial Role of Cyber Essentials in the UK Public Sector

Heimadal Security

The United Kingdom’s public sector is undergoing a digital transformation, relying increasingly on technology to enhance service delivery, streamline operations, and foster improved engagement with citizens.