Remove Cyber Risk Remove Cybersecurity Remove Digital transformation Remove Internet
article thumbnail

Seeds of Destruction: Cyber Risk Is Growing in Agriculture

The Security Ledger

In this episode of the podcast (#213): Molly Jahn of DARPA and University of Wisconsin joins us to talk about the growing cyber risk to the Food and Agriculture sector, as industry consolidation and precision agriculture combine to increase the chances of cyber disruption of food production. Read the whole entry. »

article thumbnail

MY TAKE: Why ‘basic research’ is so vital to bringing digital transformation to full fruition

The Last Watchdog

Basic research is the foundational theorizing and testing scientists pursue in order to advance their understanding of a phenomenon in the natural world, and, increasingly, in the digital realm. Along the way, of course, cybersecurity must get addressed. How quickly and pervasively any of this plays out remains to be seen.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to find, fund and fix cyber risk blind spots

SC Magazine

Today’s columnist, Sean McDermott of RedMonocle, says that companies should use the NIST 800-53 security and privacy controls to help find cyber risk blind spots. The rapid, overnight shift exposed new cyber risk blind spots and gaps unknown to security leaders or executive teams. FUND cybersecurity priorities.

article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Turn the corner into 2019 and we find Citigroup, CapitalOne, Wells Fargo and HSBC Life Insurance among a host of firms hitting the crisis button after their customers’ records turned up on a database of some 24 million financial and banking documents found parked on an Internet-accessible server — without so much as password protection.

article thumbnail

RSAC insights: How ‘TPRM’ can help shrink security skills gap — while protecting supply chains

The Last Watchdog

Digital transformation had taken hold; so their timing was pitch perfect. Cyber risks profiling. CyberGRX’s global cyber risk Exchange caught on quickly. The exchange has proven to be a perfect mechanism for fleshing out much richer cyber risk profiles of third-party vendors.

article thumbnail

Handling Pandemic Burnout While Balancing Digital Lifestyles and Cybersecurity

Hot for Security

.” Helping millions cope with conditions of the new normal, the digital world has become an indispensable tool that continues to develop while both hurting and helping society. The Internet seems to be the indispensable medium in which we live, and at the same time, it has become an extension of our mind.

article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

By no means has the cybersecurity community been blind to the complex security challenges spinning out of digital transformation. I’ve recently had several deep-dive discussions with cybersecurity experts at Juniper Networks, about this. The intensely competitive cybersecurity talent market is partly to blame here.

Firewall 224