article thumbnail

SHARED INTEL: Poll shows companies pursuing ‘Digital Trust’ reap benefits as laggards fall behind

The Last Watchdog

DigiCert’s survey presents hard evidence that trust can be the basis of a winning business model. DigiCert’s clients and prospects are steadily modernizing the way digital connections get authenticated and sensitive assets get encrypted, Trzupek told me. “In “Trust has become absolutely paramount in the world,” Nelson observes.

article thumbnail

FERC Adopts Supply Chain Risk Management Reliability Standards

Hunton Privacy

At its October monthly meeting, the Federal Energy Regulatory Commission (the “Commission”) adopted new reliability standards addressing cybersecurity risks associated with the global supply chain for Bulk Electric System (“BES”) Cyber Systems. These standards have been in development for some time.

Risk 61
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The State of Blockchain Applications in Cybersecurity

eSecurity Planet

Permissioned blockchains, or private blockchains,aren’t truly decentralized because they’re organized by a governance structure and authentication process for nodes. For advantages, private blockchains are more scalable and energy-efficient with suggested use cases of banking and supply chain management. Next-Generation Cryptography.

article thumbnail

5 Major Cybersecurity Trends to Know for 2024

eSecurity Planet

Various forms of AI, such as machine learning (ML) and large language models (LLM), already dominated headlines throughout 2023 and will continue to present both overhyped possibilities and realized potential in 2024. Joe Payne, President & CEO at Code42 expects biometrics to trigger a shift to insider threats. “As

article thumbnail

Cybersecurity Risks of 5G – And How to Control Them

eSecurity Planet

Because CUPS enables network slicing and can distribute resources throughout the network, its compromise also presents a severe risk. Exponential growth in capabilities like lower latency, more substantial bandwidth, and higher average speeds present a new world of opportunities for mobile connectivity. How 5G Goes Beyond 4G.

Risk 136
article thumbnail

SAA/CoSA/NAGARA 2018 recap: Session 204

The Schedule

Beth, Kristen, and Laura presented a program in which they each brought their unique perspective to the management of social media as records within the Federal Government. During her presentation, Beth talked about NARA’s high-level requirements and best practices for capturing records created when Federal agencies use social media.

article thumbnail

Hidden Biases in Cybersecurity Reviews – And How to Use Them

eSecurity Planet

The survey should have representation from categories such as: Company size: small to large Industry vertical: healthcare, energy, etc. Organization type: corporate, education, utility, non-profit, government International regions: Asia, South America, North America, etc.