Blog Archives

Hedge Fund Third Party Cybersecurity Risk

Is Your Administrator a Cybersecurity Risk Weak Point?

Apr 5 2016 | 6:45pm ET | Risk

Editor’s Note: Alternative investment managers know that risk comes in all shapes and sizes, and most have very detailed ways of quantifying and dealing with them. However, cyber risk often flies below the radar,

Read more ›

Posted in attack surface, Cybersecurity, defense intelligence, Financials, Insider Threats, Risk Management
Tags: , , , , ,

Cyber Risk – Part 1

The Size and Shape of Cyber Risk – Part 1

by | Mar 7, 2016

Cyber risk has no obvious shape or size. That’s why it’s such a thorny problem – it is exceedingly difficult to pinpoint factors that drive risk.

Read more ›

Posted in attack surface, Cyberattack, Cybersecurity, Governance, Layered Defense, Risk Management
Tags: , , , ,

Secure? Says Who?

Standards define if you are secure… but they have to be applied

by | Feb 29, 2016

If you’re a board member concerned about cyber risk,

Read more ›

Posted in attack surface, Compliance, Content, cybergovernance, Cybersecurity, Governance, Risk Management
Tags: , , , , , , , , ,

Cybercrime Impacts Retail Security

Retail Security: Cyber Tech Fuels Cybercrime

By Matt Pillar, senior executive editor, Innovative Retail Technologies

March 2016 Innovative Retail Technologies

In a post-EMV world, retail security experts are bracing for malice, menace, and misfortune to go digital.

Read more ›

Posted in attack surface, Compliance, Content, Customer Engagement, Cyberattack, Cybersecurity, Data Security, Fraud, Hacks, Incident Response, Layered Defense
Tags: , , , , , , ,

Vendor Compliance and Third Party Risk

5 Best Practices for Reducing Vendor & Third-Party Security Risks

Vendors and other third-party partners have caused some big data breaches. Here is how to keep it from happening to you.

By Jeff Goldman  | Posted February 08, 2016

With security breaches now a regular fixture in the news,

Read more ›

Posted in attack surface, Breach, Compliance, Content, cybergovernance, Cybersecurity, Data Security, Hacks, Insider Threats, Risk Management, Vendor Compliance
Tags: , , , , , ,

Redefining the Cybersecurity Attack Surface – Part 3

Redefining the Cybersecurity Attack Surface Part 3: Managing Complexity

by | Jan 18, 2016

This is the last part of a 3-piece series on the concept of “attack surface”. Part 1 argued that an organization’s exposure to cyber risk – traditionally calculated as a tally of the technologies that house and traffic data – also includes the people who touch all those technologies.

Read more ›

Posted in attack surface, Breach, Cyberattack, cybergovernance, Cybersecurity, Governance, Hacks
Tags: , , , , , ,

Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Google Plus

Keep Current with What’s New in Cybersecurity

Email Address:


Cybersecurity News Daily

Provides a daily summary of what's news in Cybersecurity


Recent Tweets



Get every new post delivered to your Inbox

Join other followers: