This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Started by infosec professionals, Peerlyst takes the characteristics of B2B communications we’ve become accustomed to on Twitter and LinkedIn and directs it toward cybersecurity. You can do so by submitting an email address or log in with your LinkedIn account. I’m honored to be included. It’s easy to participate on Peerlyst.
In partnership with senior executives, they need to pay close attention to the risks their companies face and the strategies those companies put in place to comply. As the rules were authorized in late 2023, we shared what we see as the implications for infosec leaders. View cyberrisk as business risk.
Cybersecurity professionals have various views on last week's news from the United States Securities and Exchange Commission (SEC) when it surprised the InfoSec community and the C-suites of corporate America. Management is required to connect the dots of cybersecurity impacts on the business.
By some accounts, ransomware attacks increased nearly 150% in the past year, and insurance claims and costs of payments skyrocketed after having already jumped approximately 230% between 2018-19. Have insurers and infosec professionals coordinate closely on security risk metrics.
Cybersecurity programs shall limit user access privileges to information systems, limit the number of privileged accounts, at a minimum annually review all user access privileges, disable or securely configure all protocols that permit remote control of devices, and promptly terminate access following departures.
The attacker gained initial access to two employee accounts by carrying out social engineering attacks on the organization’s help desk twice. Scattered Spider previously targeted telecommunications firms, likely to support its SIM-swapping activities that facilitate account takeovers.
The SEC announced its new cyber incident disclosure rules on July 26, 2023, when it appeared the rules were effective immediately. We covered the new rules on July 31, with some thoughts from InfoSec leaders. Immediately or not, Dec. 15 is now here, and the new rules will be in effect.
Every organization should have a responsible and accountable program for reducing risk through vulnerability management. A seemingly arcane topic, every organization should have vulnerability management as top-of-mind when it comes to managing cyberrisk. Why should organizations pay attention?
The CEO of BlackFog is quoted in the post as saying, "Adapting to a fast-changing landscape is key, however, and organizations need to ensure that their security teams are given the time and resources to devote to keeping pace with the latest thinking, frameworks and innovations designed to lower their cyberrisk.".
With technological innovations like cloud computing, AI/ML, the Internet of Things, and more making cyberrisks even more complex, qualified talent is hugely in demand. Many organizations will not have the IT budget to invest in them all, so they must be selective and critical to maximize risk reduction.
Ultimately, he believes “this is good for businesses as, through the insurance process, they will gain better visibility into their cyberrisks and measures they can deploy to keep digital operations secure and compliant to data privacy regulations.”. billion in premium. But much will rely on regulation.
In this Spotlight edition of the Security Ledger podcast, Rachel Stockton of LastPass * joins us to discuss the myriad of challenges facing companies trying to secure users' online activities, and simple solutions for busting insecure user behaviors to address threats like phishing, account takeover and more.
Third parties who take an interest in the scope and other details of the ISMS may doubt the organization's commitment to information risk management, information security, governance, compliance etc., increasing their risks of relying on the certificate.
The attacker gained initial access to two employee accounts by carrying out social engineering attacks on the organization’s help desk twice. Scattered Spider previously targeted telecommunications firms, likely to support its SIM-swapping activities that facilitate account takeovers.
When it comes to cyberrisks, the most up-to-date cybersecurity technology or regimented program doesn’t make an organization immune to an attack. Operating with a team of individuals who are cybersecurity savvy is one of the best tools for cyberrisk management. Use Best Password Practices.
Regulators are placing greater emphasis on the extended enterprise, holding organizations accountable for the actions of their suppliers and vendors. Integrating VRM into GRC practices is essential for ensuring regulatory compliance and mitigating risks in today’s interconnected business environment.
Minecraft warned users to secure Java versions of the game: Amazon Web Services posted about the new cyberrisk on its blog: "This vulnerability is severe and due to the widespread adoption of Apache Log4j, its impact is large.". Thankfully, the cyber tweets were not all doom and gloom. December 10, 2021.
For instance: An IT/cloud service company would probably emphasise the need to maintain adequate IT capacity and performance for its clients and for its own business operations, elaborating on the associated IT/cyberrisks. COVID is a very topical illustration.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content