With growing adoption of zero trust, CISOs must look at all possible blind spots across the organization, be that unmonitored IoT devices or third-party systems, to ensure attackers can’t find a way in.
Experts agree that future quantum computers will break most current encryption when they become sufficiently powerful. The code to do this – Shor’s algorithm – has already been written. It just needs a powerful enough quantum computer to run on. According to the Cloud Security Alliance (CSA), a suitable quantum computer will be available by …
A recent report found that companies with cyber insurance have been hit by ransomware more than those without it, and sometimes more than once. Although threat actors may not be directly correlating the insurance factor to find targets, one of the reasons for this may be that as insurers require more from companies those able to pay for insurance are also likely to be able to afford bigger ransoms.