Remove 10
article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

Here, Part 3 discusses how to manage the various DT risks. This discussion includes methods, tools, and techniques such as using personae and identifying use cases that have high business value, while minimizing project risks. This part also discusses managing CS risks such as ransomware, privacy, change management, and user adoption.

article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

And the World Economic Forum released its Global Risks Report 2018 , which placed cyber attacks sixth in the top ten global risks by perceived impact – behind weapons of mass destruction, extreme weather events, natural disasters, failure of climate-change mitigation and adaptation, and water crises. million payment cards and 1.2

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking APIs

ForAllSecure

In this episode, Jason Kent from Cequence Security talks about his experience hacking a garage door opener API, the tools he uses such as Burp, ZAP, and APK tool, and why we need to be paying more attention to the OWASP API Security Top 10. Well, it turns out that OAuth also publishes a list of the top API security risks.

article thumbnail

The Hacker Mind Podcast: Hacking APIs

ForAllSecure

In this episode, Jason Kent from Cequence Security talks about his experience hacking a garage door opener API, the tools he uses such as Burp, ZAP, and APK tool, and why we need to be paying more attention to the OWASP API Security Top 10. Well, it turns out that OAuth also publishes a list of the top API security risks.

article thumbnail

The State of Blockchain Applications in Cybersecurity

eSecurity Planet

In the recent case of the Colonial Pipeline ransomware attack , the Department of Justice and FBI were able to recover a majority of the crypto-payment made to the DarkSide ransomware group. Mitigating risk of false key propagation and identity theft. Risk of compromise. Cryptocurrency Risks for Coins.

article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

For example, in 2009, the Obama administration provided financial incentives to utilities in the United States. Like maybe I should just risk it and just start publishing this stuff to raise awareness. Like I'm trying to come up with a way now that anyone could dump the firmware out of a meter for like 10 bucks.

article thumbnail

Top Cybersecurity Companies for 2021

eSecurity Planet

Between high-profile ransomware attacks and mergers, it is a time of high stakes and great change for the industry. Here are our picks for the top 20 cybersecurity vendors plus 10 honorable mentions – with the caveat that three of those 30 companies could soon become one. Appearances on eSecurity Planet ‘s Top Vendors lists: 10.