article thumbnail

GUEST ESSAY: The three horsemen of cyber risks: misinformation, disinformation and fake news

The Last Watchdog

Such a transformation however, comes with its own set of risks. Misleading information has emerged as one of the leading cyber risks in our society, affecting political leaders, nations, and people’s lives, with the COVID-19 pandemic having only made it worse.

article thumbnail

Seeds of Destruction: Cyber Risk Is Growing in Agriculture

The Security Ledger

In this episode of the podcast (#213): Molly Jahn of DARPA and University of Wisconsin joins us to talk about the growing cyber risk to the Food and Agriculture sector, as industry consolidation and precision agriculture combine to increase the chances of cyber disruption of food production. Read the whole entry. »

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RSAC insights: How ‘TPRM’ can help shrink security skills gap — while protecting supply chains

The Last Watchdog

Digital transformation had taken hold; so their timing was pitch perfect. Cyber risks profiling. CyberGRX’s global cyber risk Exchange caught on quickly. The exchange has proven to be a perfect mechanism for fleshing out much richer cyber risk profiles of third-party vendors.

article thumbnail

Episode 163: Cyber Risk has a Dunning-Kruger Problem also: Bad Password Habits start at Home

The Security Ledger

Kevin Richards of the insurer Marsh joins us to talk about that company's Cyber Risk Perceptions Survey. » Related Stories Explained: Two-Factor vs. Multi-Factor Authentication RSA warns Digital Transformation is supercharging Digital Risk Episode 149: How Real is the Huawei Risk?

article thumbnail

Spotlight Podcast: QOMPLX CISO Andy Jaquith on COVID, Ransomware and Resilience

The Security Ledger

In this Spotlight podcast* we’re joined by Andrew Jaquith, the CISO at QOMPLX to talk about how the COVID pandemic is highlighting longstanding problems with cyber risk management and cyber resilience. Andy is an amazing resource on all matters cyber security. Read the whole entry. » New Tech Meets Old Tools.

CISO 52
article thumbnail

MY TAKE: Why companies had better start taking the security pitfalls of API proliferation seriously

The Last Watchdog

That said, APIs are certain to get a lot more attention by security teams — and board members concerned about cyber risk mitigation — in 2022. APIs have emerged as a go-to tool used by threat actors in the early phases of sophisticated, multi-stage network attacks. based supplier of networking technology.

article thumbnail

NEW TECH: Devolutions’ ‘PAM’ solution helps SMBs deal with rising authentication risks

The Last Watchdog

A 2018 Cisco Cybersecurity Special Report found that 54 % of all cyber attacks cost the target company more than $0.5 However, smaller companies rarely have the IT talent, tools, or budget to prevent such attacks. However, smaller companies rarely have the IT talent, tools, or budget to prevent such attacks.