Remove Cyber Risk Remove InfoSec Remove Internet Remove Risk
article thumbnail

Seeds of Destruction: Cyber Risk Is Growing in Agriculture

The Security Ledger

In this episode of the podcast (#213): Molly Jahn of DARPA and University of Wisconsin joins us to talk about the growing cyber risk to the Food and Agriculture sector, as industry consolidation and precision agriculture combine to increase the chances of cyber disruption of food production. Read the whole entry. »

article thumbnail

Episode 232: Log4j Won’t Go Away (And What To Do About It.)

The Security Ledger

Tomislav tells us why issues related to Log4j won’t be going away anytime soon and how organizations must adapt to deal with the risk it poses. Related Stories Spotlight: How Secrets Sprawl Undermines Software Supply Chain Security Episode 227: What’s Fueling Cyber Attacks on Agriculture ? Supply Chain Risks: The New Normal.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Peerlyst shares infosec intel; recognizes Last Watchdog as a top cybersecurity influencer

The Last Watchdog

Sharing intelligence for the greater good is an essential component of making Internet-centric commerce as safe and as private as it needs to be. Started by infosec professionals, Peerlyst takes the characteristics of B2B communications we’ve become accustomed to on Twitter and LinkedIn and directs it toward cybersecurity.

InfoSec 37
article thumbnail

Global Cybersecurity Skills Gap Still Widening Despite Growing Workforce

SecureWorld News

Cyber threats pose one of the most significant risks to businesses, governments, and individuals today. Without enough competent professionals to secure systems, assess risks, and respond to threats, organizations in every industry are dangerously exposed. in just the past year.

article thumbnail

Inside the Complex Universe of Cybersecurity

SecureWorld News

Working as CISO, DeSouza's areas of expertise include strategic planning, risk management, identity management, cloud computing, and privacy. While it fosters innovation, automation, and productivity, it simultaneously introduces significant cybersecurity and privacy risks. With the maturation of Zero Trust, propelled by the U.S.

article thumbnail

Spotlight Podcast: RSA CTO Zulfikar Ramzan on confronting Digital Transformation’s Dark Side

The Security Ledger

In this Spotlight Edition of the podcast we're speaking with RSA Chief Technology Officer Zulfikar Ramzan about how his company is adapting to help its customers confront the dark side of digital transformation initiatives: increased digital risk, including from cloud, artificial intelligence and the Internet of Things.

article thumbnail

InfoSec Leaders Weigh in on New SEC Rules Making CISO Hotseat Hotter

SecureWorld News

Cybersecurity professionals have various views on last week's news from the United States Securities and Exchange Commission (SEC) when it surprised the InfoSec community and the C-suites of corporate America. I recommend the TTX exercise or 'game' be created using the Center for Internet Security v8 control objectives and free templates.

CISO 87