article thumbnail

GUEST ESSAY: As cyber risks rise in 2020, as they surely will, don’t overlook physical security

The Last Watchdog

Related: Good to know about IoT Physical security is often a second thought when it comes to information security. All the encryption , firewalls , cryptography, SCADA systems , and other IT security measures would be useless if that were to occur. If risks are not properly assessed, providing security becomes tedious.

article thumbnail

SHARED INTEL: What can be done — today — to keep quantum computing from killing encryption

The Last Watchdog

In fact, there’s widespread recognition in corporate circles that the planning to address fresh cyber risks associated with quantum computing should have commenced long ago. Their trepidation is focused on the potential undermining of a core security component of classical computing systems: encryption. Germany and Japan.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY – A primer on ‘WAAP’ – an approach to securing APIs at the web app layer

The Last Watchdog

This has resulted in astounding innovations in cloud services, mobile computing, IoT systems and agile software development. Whether it’s IoT (Internet of Things) devices, desktop applications, web applications native to the web browsers, or mobile applications – all these types of software rely on APIs in one way or another.

article thumbnail

Have board directors any liability for a cyberattack against their company?

Security Affairs

The size of the cyber risk to companies cannot be underestimated. To indicate the size of the cyber risk to companies, there is, on average, a cyber-attack every 39 seconds, which does not mean that every attack is successful, but that there is an attempt to access companies’ computer systems with that frequency.

article thumbnail

Podcast Episode 117: Insurance Industry Confronts Silent Cyber Risk, Converged Threats

The Security Ledger

In part II, we invite Chip Block of the firm Evolver back into the studio to talk about the challenge that “converged” cyber physical systems pose to insurance carriers as they try to wrap their arms around their exposure to cyber risk. One way insurance companies are responding is by improving their modeling of cyber risk.

article thumbnail

Podcast Episode 119: EFF on Expanding Researchers Rights and AT&T talks IoT Security Fails

The Security Ledger

Also: we speak with Senthil Ramakrishnan, a lead member of AT&T’s IoT Security group about that company’s plans to work with Ericsson to certify the security of IoT devices. Certification for IoT Endpoints? Senthil Ramakrishnan is an IoT Security Lead at AT&T. Read the whole entry. »

IoT 40
article thumbnail

RSA Conference 2022 Back to Physical - The Thrill of Meeting in Person!

Thales Cloud Protection & Licensing

On the flip side, awareness of the necessity to prioritize budget and resources to reduce cyber risk is at an all-time high. Thales and Google have developed a joint trusted cloud solution featuring ubiquitous data encryption and integration of Google Cloud’s confidential computing with Thales’ CipherTrust Manager.