Remove Cyber Risk Remove Digital transformation Remove Government Remove Risk
article thumbnail

Seeds of Destruction: Cyber Risk Is Growing in Agriculture

The Security Ledger

In this episode of the podcast (#213): Molly Jahn of DARPA and University of Wisconsin joins us to talk about the growing cyber risk to the Food and Agriculture sector, as industry consolidation and precision agriculture combine to increase the chances of cyber disruption of food production. Read the whole entry. »

article thumbnail

Webinar Recap: Mitigating Cyber Risks

SecureWorld News

What is the difference between a day at the beach and managing a cyber risk assessment plan? Risk is not what happens or occurs after that risk materializes. The speakers also delve into notable topics about what risk is, what it is not, and how to analyze potential risks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RSA warns Digital Transformation is supercharging Digital Risk

The Security Ledger

Digital transformation” is the buzz word du jour in industry. But executives at RSA Security warn that it is also magnifying digital risk in ways that are easy to miss. Related Stories Third Party Cyber Risk is growing. Most Companies aren’t prepared.

article thumbnail

MY TAKE: Why ‘basic research’ is so vital to bringing digital transformation to full fruition

The Last Watchdog

Basic research is the foundational theorizing and testing scientists pursue in order to advance their understanding of a phenomenon in the natural world, and, increasingly, in the digital realm. Along the way, of course, cybersecurity must get addressed. Lots of big companies sponsor basic research; it’s how progress gets made.

article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Related: Atrium Health breach highlights third-party risks. One might assume top-tier financial services firms and healthcare vendors would have solved third-party cyber exposures by now. And opportunistic threat actors are proving adept as ever at sniffing out the weak-link third parties in any digital ecosystem. Uphill battle.

article thumbnail

GUEST ESSAY: Five stages to attain API security — and mitigate attack surface exposures

The Last Watchdog

APIs (Application Programming Interfaces) play a critical role in digital transformation by enabling communication and data exchange between different systems and applications. So, how can you ensure your API security is effective and enable your digital transformation?

article thumbnail

Episode 163: Cyber Risk has a Dunning-Kruger Problem also: Bad Password Habits start at Home

The Security Ledger

Kevin Richards of the insurer Marsh joins us to talk about that company's Cyber Risk Perceptions Survey. » Related Stories Explained: Two-Factor vs. Multi-Factor Authentication RSA warns Digital Transformation is supercharging Digital Risk Episode 149: How Real is the Huawei Risk?