article thumbnail

Quantum computing brings new security risks: How to protect yourself

CyberSecurity Insiders

Most of our current online privacy protocols utilize cryptography to maintain privacy and data integrity. Quantum computing focuses on developing computer technology based on principles that describe how particles and energy react at the atomic and subatomic levels. What are the security risks? What is quantum computing?

Risk 134
article thumbnail

How Will $1.9 Billion for Cybersecurity Protect American Infrastructure?

CyberSecurity Insiders

Division D: Energy: Title 1: Subtitle B: Cybersecurity.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IronNet and New York Power Authority (NYPA) Expand Partnership to Defend Key Supply Chain Partners with Collective Defense

CyberSecurity Insiders

(NYSE:IRNT) (“IronNet”), an innovative leader transforming cybersecurity through Collective Defense, today announced an expanded partnership with the New York Power Authority (NYPA), the nation’s largest state public power organization, to secure the state of New York’s public energy ecosystem. energy sector at large.

article thumbnail

ICS cyberthreats in 2023 – what to expect

SecureList

Other important changes in the threat landscape which we already see and which we believe will increasingly contribute to the overall picture include the following: A rising number of hacktivists “working” to internal and external political agendas. Risk factors due to geopolitical ebb and flow.

article thumbnail

Biden Signs Infrastructure Bill with $1.9B Support for Cybersecurity Efforts

SecureWorld News

Rural and Municipal Utility Advanced Cybersecurity Grant and Technical Assistance Program (Sec. 40125): An additional $350 million will be dispersed between 2022 and 2026 to develop cyber defenses for the energy sector. Further, language of the bill states grants will be given as the CISA Director deems appropriate.

article thumbnail

The Nature of Cybersecurity Defense: Pentagon To Reveal Updated Zero-Trust Cybersecurity Strategy & Guidelines

CyberSecurity Insiders

The strategy aims to keep critical data secure within high-risk environments. Justin McCarthy, Co-Founder and CTO of Strong DM agrees that developing Zero Trust strategies is an essential step towards mitigating cyber risk. This poses additional security risks. is more susceptible to digital aggressiveness.

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

Cedric Leighton is founder and president of Cedric Leighton Associates, a strategic risk and leadership management consultancy. Since founding Cedric Leighton Associates, he has become an internationally known strategic risk expert. Leighton is also a founding partner of CYFORIX, specializing in the field of cyber risk.