Blog Archives

Update and Patch Your Software

The First Rule of Cybersecurity Is Update Your Software

By Steve Rosenbush – The Wall Street Journal

There’s no easy way to make IT infrastructure fully secure from cyberattacks. But there’s an easy way to avoid a good many of the biggest threats that companies face.

Read more ›

Posted in cyber risk, Cybersecurity, Data Security, Risk Management
Tags: , , , , , ,

Healthcare Interconnectivity Opens the Door to Cyberthreats

The agenda for the annual Healthcare Information and Management Systems Society (HIMSS) conference, held last week, included a good mix of session topics covering electronic health records (EHRs), advancement of medical devices and health IT, and interoperability of systems and applications to exchange patient data. There also were sessions devoted to the important issues of protecting patient data and enhancing cybersecurity.

Read more ›

Posted in Cyberthreat, HIPAA, Risk Management


SMBs Are the “Target of Choice” for Hackers

Five Reasons Hackers are Targeting SMBs

by Steve Nice – 06/15/2017 – “Five Reasons Hackers are Targeting SMBs”

Larger organizations dominate the headlines when it comes to cybercrime, but it is the small and medium-sized business (SMBs) that are becoming the primary targets and are bearing the brunt of most attacks.

Read more ›

Posted in Cyberattack, Cybersecurity, Governance, Risk Management
Tags: , , , ,

Cyber Risk Governance

The term “Cyber Risk Governance” is being used frequently. What is a good definition, and how does it differ from GRC?

by | Jan 23, 2017 | CYBERGOVERNANCE Journal – “Cyber Risk Governance is a Unique Discipline

Read more ›

Posted in Cyber Assessment, cyber risk, defense intelligence, Risk Management
Tags: , , , , ,

The First 100 Days – Trump and Cybersecurity

Cybergovernance: 3 Initiatives for the First 100 Days

by | Nov 14, 2016

A new administration’s priorities are often set within its first 100 days. What should the new administration do to help the country achieve greater levels of cyber maturity and risk mitigation?

Read more ›

Posted in Cyberattack, Cybersecurity, Encryption, Governance, Legal, Privacy, ransomware, Regulatory, Risk Management
Tags: , , , , , , , , , , ,

Cyber Risk and D&O

How Will Cyber Risk Evolve D&O?

by | Oct 24, 2016 | Cybernance – Cybergovernance Journal “How Will Cyber Risk Evolve D&O”

“Prudent board candidates have long demanded that directors’ and officers’ insurance be in place before accepting a board seat,

Read more ›

Posted in cyber risk, Cyber-Insurance, cybergovernance, Risk Management
Tags: , , , ,

Spear-Phishing Attacks: Why They Are Successful and How to Stop Them

White Paper: Spear-Phishing Attacks

Some of the most notorious cyber crimes in recent history — such as the attacks on major banks, media companies and even security firms — started with just one person clicking on a spear-phishing email.

Spear phishing is on the rise because it works.

Read more ›

Posted in Cybersecurity, Malware & Other Threats, Phishing, Risk Management
Tags: , , , , , ,

Cyber Assessment and the Cost of a Breach

The Billion Dollar NIST Assessment

by | Oct 10, 2016 | CYBERGOVERNANCE Journal | “The Billion Dollar NIST Assessment”

The billion-dollar Yahoo hack vividly illustrates why cyber risk mitigation must start from the top down and why board members should insist on getting the actionable information they need.

Read more ›

Posted in Breach, Cyber Assessment, cyber risk, Risk Management
Tags: , , , ,

Adaptive Multifaceted Cybersecurity

Cybersecurity Must Adapt to Today’s AND Tomorrow’s Threats

The RSA Conference last February brought together 40,000 of the brightest minds in cybersecurity, along with their products, promises and predictions.

Read more ›

Posted in Cybersecurity, Incident Response, Layered Defense, Risk Management
Tags: , , , , , , ,

Regulatory Scrutiny – No Breach Required

Security Vulnerabilities: You Don’t Need a Breach to Face Regulatory Scrutiny

Those who track newsworthy data breaches and other cybersecurity incidents know what type of fallout to expect from these events.

Read more ›

Posted in Breach, Compliance, Incident Response, Regulatory, Risk Management
Tags: , , , ,

Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Google Plus

Keep Current with What’s New in Cybersecurity

Email Address:

Name:


Cybersecurity News Daily

Provides a daily summary of what's news in Cybersecurity

Archives

Recent Tweets

Categories

Follow

Get every new post delivered to your Inbox

Join other followers: