Remove Cyber Attacks Remove Cyber Risk Remove Internet Remove Risk
article thumbnail

RSAC insights: Security platforms arise to help companies discover, assess and mitigate cyber risks

The Last Watchdog

As their organizations migrate deeper into an intensively interconnected digital ecosystem, CISOs must deal with cyber attacks raining down on all fronts. Unmanaged smartphones and laptops, misconfigured Software as a Service (SaaS) apps, unsecured Internet access present more of an enterprise risk than ever.

article thumbnail

Q&A: NIST’s new ‘Enterprise Risk Management’ guidelines push cyber risks to board level

The Last Watchdog

Enterprise risk management (ERM) is a comparatively new corporate discipline. As part of its role promoting cybersecurity best practices, the National Institute of Standards and Technology ( NIST ) has stepped forward to make sure cyber exposures become part and parcel of evolving ERM frameworks. We had a most lively discussion.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Seeds of Destruction: Cyber Risk Is Growing in Agriculture

The Security Ledger

In this episode of the podcast (#213): Molly Jahn of DARPA and University of Wisconsin joins us to talk about the growing cyber risk to the Food and Agriculture sector, as industry consolidation and precision agriculture combine to increase the chances of cyber disruption of food production. Read the whole entry. »

article thumbnail

Turn Out the Lights, the Cyber Attack Is Over. Not Quite

SecureWorld News

This is due to a technical issue connected to the recent cyber attack, when we were forced to shut down our IT systems. First, any organization that uses computers and the internet is a potential target of these attacks; there is no such thing as security by obscurity. Cedric Leighton, CNN Military Analyst; U.S.

article thumbnail

Episode 238: Robots Are The Next Frontier In Healthcare Cyber Risk

The Security Ledger

about his firm’s discovery of a string of critical security flaws in an autonomous medical robot, TUG, that is already deployed in hundreds of clinical settings and the growing issue of medical device insecurity and cyber risks to healthcare. Robots Driving Cyber Risk. Read the whole entry. »

article thumbnail

How to Use Your Asset Management Software to Reduce Cyber Risks

CyberSecurity Insiders

Let us now see how you can make the best use of ITAM to minimize cyber attacks. Here is a rundown of the benefits of an asset management software in cutting down cyber-related threats. Identify assets and their associated risks. IoT devices could be used like botnets so as to execute DDoS attacks. . .

article thumbnail

NEW TECH: Trend Micro flattens cyber risks — from software development to deployment

The Last Watchdog

As jarring as this abrupt shift to remote work has been for countless companies, government agencies and educational institutions, it has conversely been a huge boon for cyber criminals. The Internet from its inception has presented a wide open attack vector to threat actors. Threat actors haven’t missed a beat. I’ll keep watch.