article thumbnail

Webinar Recap: Mitigating Cyber Risks

SecureWorld News

SecureWorld recently presented the webinar Cyber Risk: Stay Ahead of Evolving Threats With Proactive Collaboration with speakers representing Reciprocity, a leader in Governance, Risk, and Compliance Software (GRC). This is happening at the same time as massive digital transformation. A Data-Driven World and Navigating It.

article thumbnail

Federal cybersecurity: breaking down the barriers to adoption

Thales Cloud Protection & Licensing

Over the last two election cycles, we’ve seen an increased focus on election security, hacking and fraud. While many state and government officials are under no illusion that they are safe from a digital attack, concern should run deeper than election integrity. Security measures continue to be more reactive than proactive.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

What’s happening is that supply chains are becoming more intricate and far-flung the deeper we move into digital transformation and the Internet of Things. And opportunistic threat actors are proving adept as ever at sniffing out the weak-link third parties in any digital ecosystem. Advancing best practices.

article thumbnail

CISSPs from Around the Globe: An Interview with Jason Lau

CyberSecurity Insiders

I had my first experience with "hacking" as part of my electrical engineering degree at university. In my spare time, I researched and "hacked" the boot sequence of the machine with a "ModChip" I programmed, and I was able to play games from different regions around the world.