Blog Archives

NYS DFS Is Coming for YOU

New York State DFS is Coming After Your Brokerage License
The First NYS Depart. of Financial Services (DFS) Transition Period Comes to an End August 28, 2017

On February 16, 2017, the New York State Department of Financial Services (“DFS”) published final cybersecurity regulations establishing a rigorous, first-in-the-nation cybersecurity regulation for financial institutions,

Read more ›

Posted in Compliance, Cybersecurity, Governance, Government Surveilance, Legal
Tags: , , ,

SMBs Are the “Target of Choice” for Hackers

Five Reasons Hackers are Targeting SMBs

by Steve Nice – 06/15/2017 – “Five Reasons Hackers are Targeting SMBs”

Larger organizations dominate the headlines when it comes to cybercrime, but it is the small and medium-sized business (SMBs) that are becoming the primary targets and are bearing the brunt of most attacks.

Read more ›

Posted in Cyberattack, Cybersecurity, Governance, Risk Management
Tags: , , , ,

Regulatory Compliance in the Cloud

Regulatory Compliance in Action and in the Cloud – Sharing Responsibility and Ensuring Compliance

Choosing to upload your data to the cloud is, for the most part, a moot point; the advantages of mobility,

Read more ›

Posted in Cloud, Compliance, Governance, Regulatory
Tags: , , , , ,

The First 100 Days – Trump and Cybersecurity

Cybergovernance: 3 Initiatives for the First 100 Days

by | Nov 14, 2016

A new administration’s priorities are often set within its first 100 days. What should the new administration do to help the country achieve greater levels of cyber maturity and risk mitigation?

Read more ›

Posted in Cyberattack, Cybersecurity, Encryption, Governance, Legal, Privacy, ransomware, Regulatory, Risk Management
Tags: , , , , , , , , , , ,

Holistic Cybersecurity through Cyber Analytics

Achieving Holistic Cybersecurity in Government and the Enterprise through Cyber Analytics

To be effective in their security efforts, agencies and enterprises must be proactive — using cyber analytics and cognitive-based systems to develop true security intelligence.

By John Lainhart, Christopher M. Ballister | May 12,

Read more ›

Posted in cybergovernance, Cybersecurity, Governance, Layered Defense, Risk Management
Tags: , , , , , , ,

Risk and the Board

Increasing Board Engagement with Cyber Risk

by | Mar 21, 2016

Last week in our nation’s capital we met with several key players who are working to get a better handle on cyber risk.

Read more ›

Posted in Compliance, cybergovernance, Cybersecurity, Governance, Risk Management, Vendor Compliance
Tags: , , , , ,

Cyber Risk – Part 1

The Size and Shape of Cyber Risk – Part 1

by | Mar 7, 2016

Cyber risk has no obvious shape or size. That’s why it’s such a thorny problem – it is exceedingly difficult to pinpoint factors that drive risk.

Read more ›

Posted in attack surface, Cyberattack, Cybersecurity, Governance, Layered Defense, Risk Management
Tags: , , , ,

Secure? Says Who?

Standards define if you are secure… but they have to be applied

by | Feb 29, 2016

If you’re a board member concerned about cyber risk,

Read more ›

Posted in attack surface, Compliance, Content, cybergovernance, Cybersecurity, Governance, Risk Management
Tags: , , , , , , , , ,

Encryption Isn’t Going Away

Encryption App Gains Popularity Amid Apple Privacy Battle

By Steve Rosenbush for WSJ

The battle between Apple Inc. and the FBI over an encrypted iPhone used by one of the San Bernardino terrorists could be meaningful to that particular investigation. Perhaps, if the FBI wins, and Apple unencrypts the phone,

Read more ›

Posted in Content, Cybersecurity, Encryption, Governance, Governent Oversight, Government Surveilance, ID Theft, Layered Defense, Legal, Regulatory, spyware
Tags: , , , , , , , , , , ,

The Fed and Cybergovernance

Is the Government Using Its Own Cybergovernance Standards?

by | Feb 15, 2016 | For Cybergovernance Journal

The recent announcement of another IRS cyber breach raises this question: are agencies embracing and applying government cybersecurity standards?

Read more ›

Posted in Breach, Compliance, cybergovernance, Cybersecurity, defense intelligence, Governance, ID Theft, Regulatory, Risk Management
Tags: , , , , , , , , , , , ,

Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Google Plus

Keep Current with What’s New in Cybersecurity

Email Address:


Cybersecurity News Daily

Provides a daily summary of what's news in Cybersecurity




Get every new post delivered to your Inbox

Join other followers: