article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 3)

The Last Watchdog

Last Watchdog posed two questions: •What should be my biggest takeaway from 2023, with respect to mitigating cyber risks at my organization? Rebecca Krauthamer , Co-founder and CPO, QuSecure Krauthamer As new standards for quantum-resilient cryptography come into effect, many government agencies will move toward quantum-readiness.

article thumbnail

Cyber Insurance Costs Soaring: Is Your Organization Covered Enough?

SecureWorld News

Expanding coverage : Cyber insurance policies are evolving to cover a wider range of risks, including business interruption, regulatory fines, and crisis management. Data limitations : Accurately assessing cyber risk remains a challenge due to limited data. This broader scope naturally translates to higher premiums.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

3 of the Worst Data Breaches in the World That Could Have Been Prevented

Security Affairs

Experts believe Yahoo was using outdated, easy-to-crack encryption, which led to the attack. The attack is a good reminder of how critical strong encryption is in protecting your website users. government agencies. Many government agencies and Fortune 500 companies use SolarWinds, which contributed to the severity of the attack.

article thumbnail

MY TAKE: Why ‘basic research’ is so vital to bringing digital transformation to full fruition

The Last Watchdog

Ongoing basic research in advanced cryptography concepts is pivotal to putting the brakes on widening cyber risks and ultimately arriving at a level of privacy and security that makes sense. The public key is held by the individual user and the private key is held by the certified server storing the encrypted data.

article thumbnail

Turn Out the Lights, the Cyber Attack Is Over. Not Quite

SecureWorld News

The cybercriminals encrypted critical data and systems across the council's networks, severely hampering its ability to operate and provide services to residents. The better you understand these risks, through your assessment phase, the better job you can do in protecting against them and in planning for them." Air Force (Ret.);

article thumbnail

Security Vulnerabilities in US Weapons Systems

Schneier on Security

The US Government Accounting Office just published a new report: " Weapons Systems Cyber Security: DOD Just Beginning to Grapple with Scale of Vulnerabilities " (summary here ). However, they make weapon systems more vulnerable to cyber attacks. The upshot won't be a surprise to any of my regular readers: they're vulnerable.

article thumbnail

How Do You Quantify Risk? Best Techniques

Centraleyes

Enter the need for a more precise and actionable approach — Cyber Risk Quantification. This blog aims to serve as a guide to navigating the intricate terrain of cyber risk quantification, providing insights into its significance, methodologies, and the transformative impact it can have on organizational cybersecurity strategies.

Risk 52