article thumbnail

RSAC insights: Security platforms arise to help companies discover, assess and mitigate cyber risks

The Last Watchdog

As their organizations migrate deeper into an intensively interconnected digital ecosystem, CISOs must deal with cyber attacks raining down on all fronts. Unmanaged smartphones and laptops, misconfigured Software as a Service (SaaS) apps, unsecured Internet access present more of an enterprise risk than ever.

article thumbnail

Turn Out the Lights, the Cyber Attack Is Over. Not Quite

SecureWorld News

This is due to a technical issue connected to the recent cyber attack, when we were forced to shut down our IT systems. First, any organization that uses computers and the internet is a potential target of these attacks; there is no such thing as security by obscurity. Cedric Leighton, CNN Military Analyst; U.S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Internet Security Threats at the Olympics

Schneier on Security

Meanwhile, a Russia-linked cyber attack has already stolen and leaked documents from other Olympic organizations. A senior analyst at McAfee warned that the Olympics may experience more cyber attacks before closing ceremonies. EDITED TO ADD: There was already one attack.

Internet 240
article thumbnail

Q&A: NIST’s new ‘Enterprise Risk Management’ guidelines push cyber risks to board level

The Last Watchdog

The guidelines — NISTIR 8286, Integrating Cybersecurity and Enterprise Risk Management (ERM) – are specifically aimed at fostering the integration of cybersecurity risk management best practices and ERM frameworks. So the foundation was built as an open system and that created a market totally favoring the attack community.

article thumbnail

Seeds of Destruction: Cyber Risk Is Growing in Agriculture

The Security Ledger

In this episode of the podcast (#213): Molly Jahn of DARPA and University of Wisconsin joins us to talk about the growing cyber risk to the Food and Agriculture sector, as industry consolidation and precision agriculture combine to increase the chances of cyber disruption of food production. Read the whole entry. »

article thumbnail

Episode 238: Robots Are The Next Frontier In Healthcare Cyber Risk

The Security Ledger

about his firm’s discovery of a string of critical security flaws in an autonomous medical robot, TUG, that is already deployed in hundreds of clinical settings and the growing issue of medical device insecurity and cyber risks to healthcare. Robots Driving Cyber Risk. Read the whole entry. »

article thumbnail

NEW TECH: Trend Micro flattens cyber risks — from software development to deployment

The Last Watchdog

As jarring as this abrupt shift to remote work has been for countless companies, government agencies and educational institutions, it has conversely been a huge boon for cyber criminals. The Internet from its inception has presented a wide open attack vector to threat actors. Threat actors haven’t missed a beat. I’ll keep watch.