Blog Archives

NYS DFS Is Coming for YOU

New York State DFS is Coming After Your Brokerage License
The First NYS Depart. of Financial Services (DFS) Transition Period Comes to an End August 28, 2017

On February 16, 2017, the New York State Department of Financial Services (“DFS”) published final cybersecurity regulations establishing a rigorous, first-in-the-nation cybersecurity regulation for financial institutions,

Read more ›

Posted in Compliance, Cybersecurity, Governance, Government Surveilance, Legal
Tags: , , ,

The Role of Cyber Due Diligence

Private Equity Firms Need Cyber Due Diligence

by | Nov 28, 2016 | “Private Equity Firms Need Cyber Due Diligence”

Verizon’s pending acquisition of Yahoo highlights a substantial risk faced by all private equity firms: how much cyber risk will the next transaction add to their portfolio?

Read more ›

Posted in Cyber Assessment, Data Security, Financials, Legal
Tags: , , , , , , , , ,

The First 100 Days – Trump and Cybersecurity

Cybergovernance: 3 Initiatives for the First 100 Days

by | Nov 14, 2016

A new administration’s priorities are often set within its first 100 days. What should the new administration do to help the country achieve greater levels of cyber maturity and risk mitigation?

Read more ›

Posted in Cyberattack, Cybersecurity, Encryption, Governance, Legal, Privacy, ransomware, Regulatory, Risk Management
Tags: , , , , , , , , , , ,

Cyber Legislation

“We are facing a crisis of confidence that is eroding the public’s trust in our markets, and poses a real threat to our economic health… The strain on the economy is deep and spreading.”

Posted in cybergovernance, Governent Oversight, Incident Response, Legal, Regulatory
Tags: , , , , , , ,

Cyber Risk and Board Liability

Ignoring Board Liability for Cyber Risk is… Unwise

by | May 2, 2016 | Cybergovernance Journal

As the frequency and impact of cyber breaches increase,

Read more ›

Posted in Breach, Compliance, cyber risk, Governent Oversight, Legal
Tags: , , , ,

Cybersecurity Ownership & Accountability

Who Owns Cybersecurity in Your Organization?

by | Apr 4, 2016

Choosing the right standards to follow is important. Establishing a cyber risk platform that enables communication among all key stakeholders.

Read more ›

Posted in cybergovernance, Cybersecurity, Legal, Risk Management
Tags: , , , ,

Online Privacy and Censorship

Living Free Online: A Basic Guide to Internet Censorship and Privacy

In order to keep our global society open and dynamic, the general principles of online freedom must be upheld, and the average person kept as informed as possible. There is no acceptable justification for government or organizational censorship of the internet.

Read more ›

Posted in censorship, Content, Government Surveilance, Legal, Privacy, Regulatory
Tags: , , , , , ,

Encryption Isn’t Going Away

Encryption App Gains Popularity Amid Apple Privacy Battle

By Steve Rosenbush for WSJ

The battle between Apple Inc. and the FBI over an encrypted iPhone used by one of the San Bernardino terrorists could be meaningful to that particular investigation. Perhaps, if the FBI wins, and Apple unencrypts the phone,

Read more ›

Posted in Content, Cybersecurity, Encryption, Governance, Governent Oversight, Government Surveilance, ID Theft, Layered Defense, Legal, Regulatory, spyware
Tags: , , , , , , , , , , ,

Cybersecurity and the Board

6 Concepts That Help Boards Oversee Cybersecurity

by | Feb 8, 2016 | for Cybergovernance Journal – Cybernance

The U.S. Department of Homeland Security’s (DHS) top privacy official said today that a “clear mandate” from top management is the foundation of an organization’s ability to establish and implement an effective data security and privacy plan.

Read more ›

Posted in Compliance, cybergovernance, Cybersecurity, Governance, Legal, Regulatory, Risk Management
Tags: , , , , , ,

2016: The Year of Cybergovernance

2016 Is The Year of Cybergovernance: How Directors Can Protect Themselves and Their Companies

by | Jan 25, 2016 | Cybernance – First in Cybergovernance

Beijing is accelerating the Chinese economy by short-circuiting the time and cost of innovation.

Read more ›

Posted in Breach, Cyberattack, cybergovernance, Data Security, Governance, Hacks, Incident Response, Legal, Risk Management
Tags: , , , , , , , ,

Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Google Plus

Keep Current with What’s New in Cybersecurity

Email Address:


Cybersecurity News Daily

Provides a daily summary of what's news in Cybersecurity


Recent Tweets



Get every new post delivered to your Inbox

Join other followers: