Remove 2004 Remove Cyber Risk Remove Technology
article thumbnail

Spotlight Podcast: At 15 Cybersecurity Awareness Month Grows with Cyber Risk

The Security Ledger

And this year is a special occasion: a QuinceaƱera of sorts recognizing 15 years since the first Cybersecurity Awareness Month in 2004. As my guests this week note: the goals of Cyber Security focus and importance of cyber security awareness month has changed a lot since the early 2000s. October is Cybersecurity Awareness Month.

article thumbnail

Protecting your Customers and Brand in 2022: Are you doing enough?

Jane Frankland

These are leaders who understand how to implement progressive technologies, like the cloud, 5G, artificial intelligence, machine learning, and others that are intricately woven, interconnected, and interdependent. Cyber risks top worldwide business concerns in 2022. billion) is expected online.

CISO 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Best Third-Party Risk Management (TPRM) Tools of 2021

eSecurity Planet

Best Third-Party Risk Management (TPRM) Tools. Launched in 2000 to address the growing need for enterprise supplier management, Aravo Solutions now offers SaaS-based supplier information management (SIM) technology. Additional features include intake of new vendors, automating risk assessments , and conducting due diligence.

Risk 130
article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Vicarius Vulnerability management 2022 Private Dragos ICS and OT security 2021 Private Safeguard Cyber Risk management 2021 Private CyberGRX Risk management 2019 Private Signifyd Fraud protection 2018 Private RedOwl Security analytics 2015 Acquired: Forcepoint. AllegisCyber Investments.

article thumbnail

Last Watchdogā€™s IoT and ā€˜zero trustā€™ coverage win MVP awards from Information Management Today

The Last Watchdog

Iā€™ve been paying close attention to privacy and cybersecurity since 2004, first as a technology reporter at USA TODAY, then as Editor-In-Chief of ThirdCertainty.com, a corporate-underwritten news analysis blog. Iā€™ve never done stories to win awards. That usually happens every time I publish a story under my byline.

IoT 37
article thumbnail

Top Breach and Attack Simulation (BAS) Vendors

eSecurity Planet

Breach and attack simulation (BAS) is a relatively new IT security technology that can automatically spot vulnerabilities in an organizationā€™s cyber defenses, akin to continuous, automated penetration testing. DXC Technology. DXC Technology. SafeBreach holds multiple patents and awards for their BAS technology.

article thumbnail

Episode 162: Have We missed Electric Grid Cyber Attacks for Years? Also: Breaking Bad Security Habits

The Security Ledger

. » Related Stories Spotlight Podcast: Security Automation is (and isn’t) the Future of Infosec Episode 159: Deep Fakes and Election (in)Security with ZeroFOX Spotlight Podcast: Rethinking Your Third Party Cyber Risk Strategy. grid happened in March of this year. Joe Weiss, Applied Control Solutions.