Blog Archives

Redefining Cybersecurity Attack Surface – Part 2

Redefining the Cybersecurity Attack Surface Part 2: Risk & Liability

by | Jan 11, 2016

This is the second part of a 3-piece series on the concept of “attack surface”.

Read more ›

Posted in Breach, Content, Cyberattack, cybergovernance, Cybersecurity, Hacks
Tags: , , , , , ,

Cybergovernance – The Key to Cybersecurity

Needed: A Shared Cybergovernance Model

My own theory is that we are in the middle of a dramatic and broad technological and economic shift in which software companies are poised to take over large swathes of the economy.

Read more ›

Posted in Content, cybergovernance, Cybersecurity, Governance, Incident Response, Layered Defense, Risk Management
Tags: , , , ,

Universal Model of Cyber Risk – Part 2

A Universal Model for Assessing Cyber Risk Part 2: Following the Path of Financial Governance

by | Dec 14, 2015 | for Cybergovernance Journal

In part 1 we examined how the increasing incidence of cyber breaches is bringing significant pressure on corporate directors to assume more oversight of cyber risk.

Read more ›

Posted in Compliance, Content, cybergovernance, Cybersecurity, Financials, Risk Management
Tags: , , , , ,

The Hackers Who Grinched Christmas

Kids’ smart toys are big holiday targets for hackers

 by: Mark Pribish, VP / ID Theft Practice Leader – MIS, Inc.

Read more ›

Posted in Compliance, Content, Cybersecurity, Encryption, Hacks, Malware, Risk Management
Tags: , , , , , , , ,

Cyber Governance and Risk in the Boardroom

At the recent “Cyber Risks in the Boardroom” conference held in New York, leading experts in the public and private sectors shared their perspectives for directors as they navigate these uncharted waters.

Read more ›

Posted in Compliance, Content, Cybersecurity, Governance, Hacks, Regulatory, Risk Management
Tags: , , , , , ,

The True Cost of A Cyber Attack: EVERYTHING

A cyber attack can cost you everything… and more

by Kirsten Charlton and Chad J. Layton, Segal McCambridge Singer & Mahoney

Imagine you’re preparing for your second round of funding and Brian Krebs calls you asking if you were aware your company has suffered a cyber attack.

Read more ›

Posted in Breach, Content, Cybersecurity, Data Security, Financials, Hacks, Insider Threats, Risk Management
Tags: , , , , , , ,

Leadership & Data Breach Incident Response

Lack of leadership can hurt data breach incident response

by: Mark Pribish

“Poor communications, lack of leadership and lack of board oversight are barriers to effective incident response,” according to a new Ponemon Institute research report titled “The Importance of Senior Executive Involvement in Breach Response.”

Read more ›

Posted in Breach, Content, Incident Response, Insider Threats, Risk Management
Tags: , , , , , , , ,

Mobile Security and YOU

Mobile Devices and Your Security – Beyond Simple BYOD

By Michael O’Shaughnessy

Here is a question I bet you have never asked yourself; is your smartphone secure? I don’t mean a password, although that is important, I mean using an actual anti–virus/malware app. If you have some type of scanning app loaded on your phone congratulations,

Read more ›

Posted in Content, Cybersecurity, Hacks, ID Theft, Mobile
Tags: , , , , , , ,

ID Theft Protection

ID Theft Protection Services Create False Sense of Security

Mark Pribish, Special for The Republic | 12:51 p.m. MST November 13, 2015
Millions of consumers are spending more than $3 billion a year on monitoring services to protect from ID theft.

Read more ›

Posted in Breach, Compliance, Content, Fraud, ID Theft, Legal, Malware, Multi-Factor Authentication, Risk Management
Tags: , , , , , , , , ,

Data Theft and the Role of Big Data

How to discover data theft using Hadoop and Big data?

By Kaushik Pal, Techalpine

big-data-talent-searchbig-data-talent-searchData theft has been a big issue for quite some time. What adds to the problem is the long time taken to identify the theft. The longer it takes to detect data theft,

Read more ›

Posted in Big Data, Breach, Content, Data Security, Incident Response, Risk Management
Tags: , , , , , , , ,

Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Google Plus

Keep Current with What’s New in Cybersecurity

Email Address:


Cybersecurity News Daily

Provides a daily summary of what's news in Cybersecurity


Recent Tweets



Get every new post delivered to your Inbox

Join other followers: