Remove Cyber Risk Remove Risk Remove Technology
article thumbnail

GUEST ESSAY: The three horsemen of cyber risks: misinformation, disinformation and fake news

The Last Watchdog

Such a transformation however, comes with its own set of risks. Misleading information has emerged as one of the leading cyber risks in our society, affecting political leaders, nations, and people’s lives, with the COVID-19 pandemic having only made it worse. So, how do organizations prepare against such threats?

article thumbnail

GUEST ESSAY: Leveraging DevSecOps to quell cyber risks in a teeming threat landscape

The Last Watchdog

In today’s digital landscape, organizations face numerous challenges when it comes to mitigating cyber risks. Related: How AI is transforming DevOps The constant evolution of technology, increased connectivity, and sophisticated cyber threats pose significant challenges to organizations of all sizes and industries.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Newsweek Op-Ed: Oversight of the Management of Cybersecurity Risks: The Skill Corporate Boards Need, But, So Often, Do Not Have

Joseph Steinberg

To read the piece, please see Oversight of the Management of Cybersecurity Risks: The Skill Most Corporate Boards Need, But Don’t Have on Newsweek.com. Earlier today, Newsweek published an op-ed that I wrote on this important topic.

Risk 261
article thumbnail

NEW TECH: Trend Micro flattens cyber risks — from software development to deployment

The Last Watchdog

Thus the urgency for organizations to put all excuses aside and embrace stricter cyber hygiene practices could not be any higher. Cybersecurity technology is far more advanced today than it was five years ago, or even two years ago. Something needs to be done to flatten the cyber risk curve. I’ll keep watch.

article thumbnail

NEW TECH: CyberGRX seeks to streamline morass of third-party cyber risk assessments

The Last Watchdog

So they began inundating their third-party suppliers with “bespoke assessments” – customized cyber risk audits that were time consuming and redundant. Kneip also painted the wider context about why effective third-party cyber risk management is an essential ingredient to baking-in security at a foundational level.

article thumbnail

CyberSecurity Is Not Enough: Businesses Must Insure Against Cyber Losses

Joseph Steinberg

And even relatively rich organizations may fail altogether if they suffer the reputational harm that follows multiple serious cyber-incidents. Not only are they not protected against their own losses, but many have zero liability protection in the event that they somehow become a hacker’s catalyst for inflicting cyber-damage on others.

Insurance 364
article thumbnail

GUEST ESSAY: As cyber risks rise in 2020, as they surely will, don’t overlook physical security

The Last Watchdog

Related: The case for quantifying cyber risks The most important factor that should be taken into account is a security risk assessment. If risks are not properly assessed, providing security becomes tedious. Physical security gates may also help ensure access is only granted to those with sufficient privileges.