Navigating China's Cybersecurity Laws and Their Economic Impact
Tune in to Mary Kissel, Executive Vice President and Senior Policy Advisor at Stephens Inc. discussing the business and cyber risks emanating from the Chinese market.
Who is Responsible for Operational Technology Security?
We recommend that all organizations that have Operational Technology (OT) consolidate the security functions and management under the enterprise CISO. Though most organizations with OT are not aligned that way today, we predict that by 2025 more than 60% will have more centralized security control over both types of environments.
The Second Law of AuthN Dynamics
Passwordless authentication is kind of hot right now, even though “passwordless” predates the password—much like horse-drawn carriages predated cars (which were first known as “horseless carriages”). But after witnessing a groundswell of support for new passwordless methods, I resolved to determine for myself whether that brave new world that has such security in it had in fact arrived. In short, we’re still not quite there yet.
Securing Tomorrow: Quantum Computing Horizons in Cybersecurity
Dive into the enigmatic realm of quantum computing, where advanced technology parallels magic. While space exploration and AI seamlessly integrate into daily life, quantum computing remains a captivating mystery. Quantum computers won't replace classical ones; instead, they birth novel algorithms for once-insolvable problems. The blog outlines challenges in constructing and expanding quantum computers due to their fragility and noise.
Beyond Boundaries: The Geopolitics of Cyberspace
The concept of sovereignty serves as the foundation for various rules and principles of international law and is considered to be the cornerstone of international law. The modern conception of the state is characterized by notions of territory as fixed boundaries, under the power and rule of specific states, and protected by international laws which legitimize the state as territorially fixed. Thus, sovereignty and the international legal personality of states are inextricably linked.
Securing the Digital Universe: Where Do We Even Start?
What a huge topic. The Digital Universe. Is this more than the Metaverse or less? Anyway: We live in the Digital Age. The vast majority of organizations rely on digital services to run at least parts of their business. Every one of us is consuming such digital services. They are ubiquitous. But this bigger ecosystem of connected digital services, of consumers and customers and citizens, of businesses and governments, of business partners and suppliers, of devices and things is at risk.
Securing the Autonomous World by Reinforcing Cybersecurity
Automation powered by artificial intelligence and machine learning has grown exponentially in the past few years. Companies are leveraging the benefits of automating to simplify complex and redundant tasks and optimize efficiency. Automation is also becoming a key player in cybersecurity for threat detection, incident response, and vulnerability management in real-time.
Future Cybersecurity Threats: Advanced Disinformation Campaigns
Cyberspace greatly enhances an actor's ability to engage in activities that can yield geopolitical and economic gains without resorting to the use of force. With the advent of cyberspace, various actors, including both state and non-state entities, have taken advantage of its vast interconnectedness to partake in a wide range of activities, including malicious behavior.
Future Cybersecurity Threats: Be Prepared
Preparing for future cybersecurity threats can be daunting, but it really doesn’t have to be the case if cyber security leaders recognize the true nature of the challenge. An analysis of past cyber-attacks reveals that they tend to be cyclic and lack any real innovation.
The Rise of AI Is Revolutionizing Cyber-Attacks
Artificial Intelligence (AI) has been a revolutionary force in several fields, transforming industries and increasing efficiency. Its impact, however, is not restricted to good applications. AI has also found its way into the hands of cyber attackers, allowing them to exploit weaknesses, launch targeted attacks, and evade traditional security measures more effectively. Certainly, AI can help attackers just as easily as it can help defenders.
Inside cyberevolution: What to Expect at KuppingerCole's New Conference
Join KuppingerCole CEO Berthold Kerl to find out what cyberevolution is all about and why you should join.
Oracle Access Governance: Cloud-Based Centralized Visibility
Access governance concerns the access mechanisms and their relationships across IT systems. It is instrumental in monitoring and mitigating access-related risks. Removing risks, enforcing compliance, and automating processes provide security against access breaches and data leaks.
Previous
1 2 3 4 5 6 7 Next