Remove 2018 Remove Cyber Risk Remove Technology
article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Third-party cyber risks are likely to persist at the current scale for a while longer. According to a recent Ponemon Institute study , some 59% of companies experienced a third-party data breach in 2018, yet only 16% believe they are effectively mitigating third-party risk. Uphill battle.

article thumbnail

Scanning for Flaws, Scoring for Security

Krebs on Security

For years, potential creditors have judged the relative risk of extending credit to consumers based in part on the applicant’s credit score — the most widely used being the score developed by FICO , previously known as Fair Isaac Corporation. Data accidentally released by FICO about the Cyber Risk Score for ExxonMobil.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

This Simple Hack Could Tank Your Business

Adam Levin

In 2018, security researchers discovered a perfect copy of Reddit.com, one of the five most-visited sites online, under the domain name Reddit.co (.co As in virtually every cyber risk, one path to risk mitigation here is education and training. Examples of typosquatting are easy to come by.

Hacking 237
article thumbnail

Fitch Ratings: Cyberattacks could pose a material risk to water and sewer utilities

Security Affairs

” Credit rating agencies assess the capacity for utilities to repay their debt and cyber attacks could impact it. Technology investment, including solutions to defend utilities from cyber attacks, would expect to play a crucial role within the capital improvement plan of critical infrastructure. Pierluigi Paganini.

Risk 127
article thumbnail

Empowering Boards for Cybersecurity Incidents

SecureWorld News

A 2022 PwC study found that 59% of directors admitted their board is not very effective in understanding the drivers and impacts of cyber risks for their organization, emphasizing the critical role of board members in these moments. Postmortems should be used to identify weaknesses in both technology and processes.

article thumbnail

Preparing for Critical Infrastructure Changes in Australia

Cisco Security

The Australian Government’s Security Legislation Amendment (Critical Infrastructure) Bill 2020 introduces an expanded and enhanced legislative framework for protecting critical infrastructure and systems of national significance (CISONS), building on 2018’s Security of Critical Infrastructure (SOCI) Act.

article thumbnail

Q&A: Why SOAR startup Syncurity is bringing a ‘case-management’ approach to threat detection

The Last Watchdog

Some 27 percent of IT professionals who partook in a survey conducted by next-gen firewall supplier Imperva at RSA 2018 reported receiving more than 1 million security alerts daily. This, in short, is the multi-headed hydra enterprises must tame in order to mitigate rising cyber risks. Smart money.