Access Management , Artificial Intelligence & Machine Learning , Next-Generation Technologies & Secure Development

ISMG Editors: Are Frequently Used Usernames a Security Risk?

Also; The 'Quantum Divide'; Global AI Regulatory Trends
Clockwise, from top left: Anna Delaney, Tony Morbin, Tom Field and Mathew Schwartz

In the latest weekly update, four editors at Information Security Media Group discuss important cybersecurity and privacy issues, including how to keep assets secure in the quantum era, when common usernames pose a cybersecurity threat, and how to strike the right balance between regulation and innovation in AI.

See Also: The Dark Side of AI: Unmasking its Threats and Navigating the Shadows of Cybersecurity in the Digital Age

The panelists - Anna Delaney, director, productions; Tony Morbin, executive news editor, EU; Mathew Schwartz, executive editor of DataBreachToday & Europe; and Tom Field, senior vice president, editorial - discuss:

  • Highlights from a conversation with retired U.S. Air Force Col. Jen Sovada of SandboxAQ at BlackHat 2023 on the "quantum divide" and how to prepare for threats to encryption;
  • Whether organizations should attempt to enhance security by using nonstandard usernames or focus on strong credentials, such as cryptographic keys;
  • The challenges and opportunities in the realm of AI regulation over the next few years.

The ISMG Editors' Panel runs weekly. Don't miss our previous installments, including the Sept. 1 identity security special edition and the Sept. 8 edition on reasons to cheer about the cybersecurity market.


About the Author

Anna Delaney

Anna Delaney

Director, Productions, ISMG

An experienced broadcast journalist, Delaney conducts interviews with senior cybersecurity leaders around the world. Previously, she was editor-in-chief of the website for The European Information Security Summit, or TEISS. Earlier, she worked at Levant TV and Resonance FM and served as a researcher at the BBC and ITV in their documentary and factual TV departments.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.