Remove Cyber Risk Remove Cybersecurity Remove Digital transformation Remove Government
article thumbnail

Seeds of Destruction: Cyber Risk Is Growing in Agriculture

The Security Ledger

In this episode of the podcast (#213): Molly Jahn of DARPA and University of Wisconsin joins us to talk about the growing cyber risk to the Food and Agriculture sector, as industry consolidation and precision agriculture combine to increase the chances of cyber disruption of food production. Read the whole entry. »

article thumbnail

MY TAKE: Why ‘basic research’ is so vital to bringing digital transformation to full fruition

The Last Watchdog

Basic research is the foundational theorizing and testing scientists pursue in order to advance their understanding of a phenomenon in the natural world, and, increasingly, in the digital realm. Along the way, of course, cybersecurity must get addressed. Lots of big companies sponsor basic research; it’s how progress gets made.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Is Cybersecurity More Difficult Than Going to Mars?

Security Boulevard

However, the rapid rise of digital transformation has changed the world we live in, connecting continents and laying the foundation for meaningful space travel. The post Is Cybersecurity More Difficult Than Going to Mars? appeared first on Security Boulevard.

article thumbnail

GUEST ESSAY: Five stages to attain API security — and mitigate attack surface exposures

The Last Watchdog

APIs (Application Programming Interfaces) play a critical role in digital transformation by enabling communication and data exchange between different systems and applications. So, how can you ensure your API security is effective and enable your digital transformation?

article thumbnail

Has ESG Become aWake-Up Call for Cybersecurity?

Security Boulevard

Has ESG Become aWake-Up Call for Cybersecurity? Even with ransomware costing billions of dollars in losses and cyber insurance claims, organizations are still impacted beyond the checkbook. Maintaining these critical resources directly impacts the organization’s risk scoring. Global trade governance and compliance.

article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

What’s happening is that supply chains are becoming more intricate and far-flung the deeper we move into digital transformation and the Internet of Things. And opportunistic threat actors are proving adept as ever at sniffing out the weak-link third parties in any digital ecosystem. Uphill battle.

article thumbnail

SPOTLIGHT: Women in Cybersecurity

McAfee

There are new and expanding opportunities for women’s participation in cybersecurity globally as women are present in greater numbers in leadership. This is based on in-depth discussions with numerous industry experts in cybersecurity and analyzing and synthesizing third-party reports, surveys, and media sources. government clients.