Making Cybersecurity ‘Lagom’
Join Swedbank’s Patrick Shirazi when he discusses the human role in cybersecurity and what cybersecurity experts can learn from the Swedish concept of Lagom.
Enhancing AI Cybersecurity: A Two-Fold Approach
Tune in to Sray Agarwal, Senior Director at Fractal AI discussing ethical frameworks, cybersecurity aspects, and data security of artificial intelligence models.
A Secure Supply Chain is Impossible. Here is why.
Cyberattacks in the global supply chain are the new wild frontier. Many will feature theft of credentials, later used for major attacks including ransomware on much larger partner companies. But the nature of supply chains means they can never be 100% secure, but we can do better if we stick together.
Ransomware Attacks in a Protected Environment
Tune in to Florian Jörgens, CISO at Vorwerk discussing ransomware attacks and why networking is important to counter it.
Tech vs. Law: A Dialectical Approach to Balancing Innovation and Regulation
The complex relationship between law and technology presents a world of possibilities. While some may view law as a constraint on innovation, it serves a crucial role in safeguarding public welfare and ensuring accountability. Engaging discussions on this dynamic intersection create a space for diverse voices and foster fruitful collaborations among stakeholders.
Navigating China's Cybersecurity Laws and Their Economic Impact
Tune in to Mary Kissel, Executive Vice President and Senior Policy Advisor at Stephens Inc. discussing the business and cyber risks emanating from the Chinese market.
Who is Responsible for Operational Technology Security?
We recommend that all organizations that have Operational Technology (OT) consolidate the security functions and management under the enterprise CISO. Though most organizations with OT are not aligned that way today, we predict that by 2025 more than 60% will have more centralized security control over both types of environments.
The Second Law of AuthN Dynamics
Passwordless authentication is kind of hot right now, even though “passwordless” predates the password—much like horse-drawn carriages predated cars (which were first known as “horseless carriages”). But after witnessing a groundswell of support for new passwordless methods, I resolved to determine for myself whether that brave new world that has such security in it had in fact arrived. In short, we’re still not quite there yet.
Securing Tomorrow: Quantum Computing Horizons in Cybersecurity
Dive into the enigmatic realm of quantum computing, where advanced technology parallels magic. While space exploration and AI seamlessly integrate into daily life, quantum computing remains a captivating mystery. Quantum computers won't replace classical ones; instead, they birth novel algorithms for once-insolvable problems. The blog outlines challenges in constructing and expanding quantum computers due to their fragility and noise.
Beyond Boundaries: The Geopolitics of Cyberspace
The concept of sovereignty serves as the foundation for various rules and principles of international law and is considered to be the cornerstone of international law. The modern conception of the state is characterized by notions of territory as fixed boundaries, under the power and rule of specific states, and protected by international laws which legitimize the state as territorially fixed. Thus, sovereignty and the international legal personality of states are inextricably linked.
Securing the Digital Universe: Where Do We Even Start?
What a huge topic. The Digital Universe. Is this more than the Metaverse or less? Anyway: We live in the Digital Age. The vast majority of organizations rely on digital services to run at least parts of their business. Every one of us is consuming such digital services. They are ubiquitous. But this bigger ecosystem of connected digital services, of consumers and customers and citizens, of businesses and governments, of business partners and suppliers, of devices and things is at risk.
Securing the Autonomous World by Reinforcing Cybersecurity
Automation powered by artificial intelligence and machine learning has grown exponentially in the past few years. Companies are leveraging the benefits of automating to simplify complex and redundant tasks and optimize efficiency. Automation is also becoming a key player in cybersecurity for threat detection, incident response, and vulnerability management in real-time.
1 2 3 4 5 6 7 Next