article thumbnail

LW ROUNDTABLE: Wrist slap or cultural shift? SEC fines cyber firms for disclosure violations

The Last Watchdog

As organizations continue facing escalating cyber threats, how they communicate multiplying and rapidly morphing cyber exposures – in essence how much they choose to abide by industry standards and embrace ethical practices — remains under intense scrutiny. There is only one path forward: transparency.

article thumbnail

Cybersecurity Snapshot: U.S. Gov’t Urges Adoption of Memory-Safe Languages and Warns About Iran Cyber Threat

Security Boulevard

government’s latest call for developers to use memory-safe programming languages, as well as its warning for cybersecurity teams regarding cyber risk from hackers tied to Iran. Plus, get the latest on ransomware trends, the quantum computing cyber threat and more! Check out the U.S. and the U.K.)

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why CISOs Are Stepping Away and What the Future Holds

SecureWorld News

Tasked with safeguarding data and infrastructure, CISOs face mounting pressures as cyber threats escalate, regulatory demands grow, and the role expands to encompass strategic business responsibilities. The Chief Information Security Officer (CISO) has become one of the most critical roles in modern organizations.

article thumbnail

OT Under Siege No More? Fortinet Report Shows Improving Landscape

SecureWorld News

Based on a global survey of more than 550 OT professionals, the findings reveal both a maturing OT security landscape and the persistent threats it continues to face. One of the most striking revelations in the report : 52% of organizations now report that the CISO/CSO is responsible for OT cybersecurity, up from just 16% in 2022.

article thumbnail

Cybersecurity’s Comfort Zone Problem: Are you Guilty of it?

Jane Frankland

One of my friends, Greg van der Gaast tells this great story that perfectly illustrates one of the biggest challenges we face in cybersecurity today. It goes something like this… “Imagine someone who loves coffee. They have a fantastic coffee shop just steps from their home, serving the best lattes and espressos in town.

article thumbnail

The Relevance of Privacy-Preserving Techniques and Generative AI to DORA Legislation

Thales Cloud Protection & Licensing

To address these challenges, the European Union introduced the Digital Operational Resilience Act (DORA) in 2022, designed to ensure that financial entities can withstand and recover from cyber threats while maintaining operational continuity. The world has changed.

article thumbnail

Cybersecurity Snapshot: Experts Issue Best Practices for Migrating to Post-Quantum Cryptography and for Improving Orgs’ Cyber Culture

Security Boulevard

National Cyber Security Centre’s (NCSC) “ Timelines for migration to post-quantum (PQC) cryptography.” Embrace change: Stay attuned to emerging cyber risks and be ready to modify cybersecurity processes accordingly. Show how this capacity to adapt to new cyber threats helps strengthen the organization’s resilience.