Blog
Making Cybersecurity ‘Lagom’
by Marius Goeddert
In today's episode of the cyberfiles we talk to Patrick Shirazi, Enterprise Security Architect at Swedbank, who thinks cybersecurity needs to be balanced. In accordance with the Swedish concept of ‘Lagom’, cybersecurity should not be too strict and not too lenient. At cyberevolution, Patrick will give a session entitled " The Human Factor: Why people are the main key to cybersecurity " in which he will present several use cases to demonstrate why it is essential to consider the human factor in any organization’s cyber threat landscape.
Blog
Enhancing AI Cybersecurity: A Two-Fold Approach
by Marius Goeddert
In today's episode of the cyberfiles we talk to Sray Agarwal, Senior Director at Fractal AI, who says that data in AI models needs to be encrypted in such a way that even very diligent hackers or attackers that breach your security systems have no use of the data. At cyberevolution, Sray will give a keynote entitled " RAI 2.0 in the era of Gen AI - Need for Regulating AI " in which he will discuss ethical frameworks, cybersecurity aspects, and data security of artificial intelligence models. Tune in to his video interview and get a taste of what to expect.
Blog
A Secure Supply Chain is Impossible. Here is why.
by Paul Fisher
Type an email address into DeHashed or similar and there is a pretty good chance it will appear as one of millions scraped or exposed on the Internet every single day. That email is an identity. Guess the password attached to this identity (not hard given how weak most passwords are.  Password1, anyone?) and a hacker has instant access to everything attached to that identity. Sometimes they don’t need to guess, the password will be conveniently placed next to the email in a poorly configured database. In the end that’s what most cybercrime activity is, industrial...
Blog
Ransomware Attacks in a Protected Environment
by Marius Goeddert
In today's episode of the cyberfiles we talk to Florian Jörgens, Chief Information Security Officer of the Vorwerk Group. Vorwerk is a German industry giant producing a wide range of products from the kitchen appliance Thermomix to robotic vacuum cleaners and more. At cyberevolution, Florian will give a 90-minute workshop entitled  "Hacked! 72 Hours of a CISO's Nightmare"   in which he will highlight the immediate steps and strategies essential to mitigating damage and restoring operations after a successful cyberattack.
Blog
Tech vs. Law: A Dialectical Approach to Balancing Innovation and Regulation
by Alejandro Leal
Reshaping the future The relationship between law and technology is a complex one. While law plays a crucial role in safeguarding public interests and ensuring checks and balances, it is also perceived by some as a potential impediment and a deterrent to innovation in the tech industry. Proponents of this idea argue that the tech industry has thrived in part because of its ability to respond to market demands. However, discussions around law and technology tend to yield valuable insights, often involving multiple stakeholders and featuring concerted efforts. During my graduate...
Blog
Navigating China's Cybersecurity Laws and Their Economic Impact
by Marius Goeddert
Today’s guest in the cyberfiles is Mary Kissel, Executive Vice President and Senior Policy Advisor at Stephens Inc., one of the largest privately owned investment banks in the United States. Before her role at Stephens, Mary served as Senior Advisor to Secretary of State Mike Pompeo from October 2018 to January 2021 and she had a long and distinguished career at the Wall Street Journal editorial board. At Stephens, Mary consults international clients on risk management in different market environments. At cyberevolution , Mary will be part of the panel entitled Unmasking the...
Blog
Who is Responsible for Operational Technology Security?
by John Tolbert
Operational Technology is comprised of the hardware, software, and networks that actuate, control, monitor, and analyze physical processes, machines, and infrastructure used in various industries such as manufacturing, transportation, health care, power generation and distribution, pharmaceuticals, oil and gas, water treatment, etc. OT encompasses multiple categories including Critical Infrastructure Systems (CIS) for civil and national interests, such as power generation and distribution, traffic control, water treatment, etc.; Industrial Control Systems (ICS) such as SCADA nodes,...
Blog
The Second Law of AuthN Dynamics
by Mike Neuenschwander
Or, Passwordless as the 0th Factor of Authentication Passwordless authentication is kind of hot right now, even though “passwordless” predates the password — much like horse-drawn carriages predated cars (which were first known as “horseless carriages”). But after witnessing a groundswell of support for new passwordless methods such as YubiKey , FIDO Passkey (not to be confused with Apple Passkey), and MS passwordless authentication methods, I resolved to determine for myself whether that brave new world that has such security in it had in fact...
Blog
Securing Tomorrow: Quantum Computing Horizons in Cybersecurity
by Alexei Balaganski
Arthur C. Clarke, the famous English science fiction writer, had once noted that any sufficiently advanced technology is indistinguishable from magic. Back in the 1960s, he was probably thinking about space exploration, which was the hottest and most impressive topic of that decade. Since then, however, spacecraft have unfortunately lost a large portion of their glamour, becoming instead reliable workhorses for the industry. A few other revolutionary technologies have met the same fate during the later decades as well – the Internet, mobile communications, electric vehicles, etc. The...
Blog
Beyond Boundaries: The Geopolitics of Cyberspace
by Alejandro Leal
In recent years, the question of a state's territorial sovereignty in cyberspace has been a major topic of discussion. The emergence of cyberspace has introduced new spatial dimensions and challenged our understanding of international law. When it comes to cyberspace, the solid and defined notion of territory does not necessarily apply there. Sovereignty has been unbundled in cyberspace, both in practice and in legality. At its core, the notion of sovereignty in cyberspace encompasses a state's authority and control over the digital activities that take place within its borders. While...
Previous
1 2 3 4 5 6 7 Next