Remove Cyber Risk Remove Digital transformation Remove Media Remove Risk
article thumbnail

GUEST ESSAY: The three horsemen of cyber risks: misinformation, disinformation and fake news

The Last Watchdog

Such a transformation however, comes with its own set of risks. Misleading information has emerged as one of the leading cyber risks in our society, affecting political leaders, nations, and people’s lives, with the COVID-19 pandemic having only made it worse. So, how do organizations prepare against such threats?

article thumbnail

How to find, fund and fix cyber risk blind spots

SC Magazine

Today’s columnist, Sean McDermott of RedMonocle, says that companies should use the NIST 800-53 security and privacy controls to help find cyber risk blind spots. The rapid, overnight shift exposed new cyber risk blind spots and gaps unknown to security leaders or executive teams. Credit: NIST.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: GraphQL APIs rev up innovation – but also introduce a potential security nightmare

The Last Watchdog

In 2015, the social media giant released GraphQL as an open source project. Then along came digital transformation – and the irresistible pressure for companies to digitize or die. Ideally, businesses would fully understand the cyber risks posed by APIs and thoughtfully account for them.

article thumbnail

Key Cybersecurity Trends for 2024: My Predictions

Jane Frankland

Just like in previous years, 2024 is set to test practitioners’ skills as the frequency of cyber threats continues to surge leaving no room for complacency. Digital Transformation In 2024, several trends are expected to shape the landscape of digital transformation. Here are my predictions for 2024.

article thumbnail

SPOTLIGHT: Women in Cybersecurity

McAfee

Research from Cybersecurity Ventures, which first appeared in the media early last year, predicts that women will represent more than 20 percent of the global cybersecurity workforce by the end of 2019. Either way, the 20 percent figure is still way too low, and our industry needs to continue pushing for more women in cyber.

article thumbnail

Handling Pandemic Burnout While Balancing Digital Lifestyles and Cybersecurity

Hot for Security

They have slowly turned into an extension of ourselves, encompassing large volumes of information that in the end make up our real-life and digital selves. However, the increased exposure to cyber risks is not limited just to the remote-working population.

article thumbnail

Three takeaways from the Colonial Pipeline attack

SC Magazine

That distinction is important for identifying risk. While the Oldsmar, Florida hack, for example, shined a light on risks associated with remote access to industrial control systems, Colonial Pipeline exposed IT system vulnerabilities that could exist in any sector. ” When it comes down to it, “OT is a production element.

Insurance 117