Blog Archives

Cybersecurity and Compliance Vulnerabilities

Identifying and Defeating Cybersecurity and Compliance Vulnerabilities

Part of the cybersecurity community has considered this last incident (OPM) the equivalent of a cyber-9/11. In it, millions of data points belonging to US Government personnel were compromised, and there is a concrete threat that the stolen data could be used by threat actors in further cyber-attacks against additional Government agencies and individuals.

Read more ›

Posted in Compliance, Content, Continuous Monitoring, Cybersecurity, Fraud, Hacks, Insider Threats, Layered Defense, Malware, Malware & Other Threats, Risk Management, Vendor Compliance
Tags: , , , , , , , ,

Make Compliance Pain-free

Organizations are placing far too much emphasis on the compliance certification and not enough on the compliance process

by: Dan Maloney, for infosecurity

Perhaps the most surprising fact about last year’s slew of data breaches is that the organizations that made headlines were considered compliant with at least one of the common security frameworks,

Read more ›

Posted in Compliance, Content, Cybersecurity, Governent Oversight, Incident Response, Insider Threats, Layered Defense, Malware & Other Threats, Risk Management, Vendor Compliance
Tags: , , , , , , ,

The REAL Cost of Cybercrime

The Real Cost of Protecting Your Company from Cybercrime is NOT in Short-term Costs, But Long-term Savings

Reactive security can't buy lower costs.Reactive security can't buy lower costs.

Thanks to: Doug Bonderud

What’s the real cost of cybercrime? It’s a hard number to pin down, since there are so many factors influencing the total for any given company.

Read more ›

Posted in Breach, Compliance, Content, Cybersecurity, Financials, Hacks, Incident Response, Insider Threats, Layered Defense, Malware, Risk Management, Vendor Compliance
Tags: , , , , , , , ,

CFPB – Enforcing Compliance with a Vengeance

CFPB – High risk… Hefty Fines!

by: Dennis Dissick, Adjunct Professor, New York University Polytechnic Institute / Area Director, Eastern Region, SMLR Group, Inc.

‘Tis the season for regulation…IRS, DOJ, FTC, state AGs, and now the CFPB all make sure that regulations and audits are a year round adventure.

Read more ›

Posted in Compliance, Content, Continuous Monitoring, Cybersecurity, Governent Oversight, Insider Threats, Layered Defense, Legal, Risk Management, Vendor Compliance
Tags: , , , , , , , , , ,

BYOD and Mobile Apps

The security threat of BYOD and unvetted mobile apps

by Suhail Nanji, Area Director, Southeast Region, SMLR Group

It’s likely happening in your organization, whether you have an official policy or not. Employees are probably running software applications on their own mobile devices or employer-issued devices to access company information.

Read more ›

Posted in Compliance, Content, Cybersecurity, Hacks, Incident Response, Insider Threats, Malware, Malware & Other Threats, Mobile, Regulatory, Vendor Compliance
Tags: , , , , , , , , , , ,

Encryption Layers Demystified

Cracking the Confusion: Encryption Layers

by Adrian Lane for Securosis

Encryption Layers

Picture your enterprise applications as a layer cake; applications sit atop databases, databases atop files, and files mapped onto storage volumes. You can use encryption at each of these layers in your application stack;

Read more ›

Posted in Compliance, Content, Cybersecurity, Encryption, Hacks, Incident Response, Privacy, Risk Management, Vendor Compliance
Tags: , , , , , , , , ,

Protecting Against Anthem-Like Attacks

Experts Offer 9 Tips for Minimizing Risk of Anthem-Like Hacker Intrusions

Protecting Against Anthem-Like AttacksProtecting Against Anthem-Like Attacks

By , February 10, 2015 for HealthCareInfoSec

In the aftermath of the massive data breach at Anthem Inc.,

Read more ›

Posted in Compliance, Cyberattack, Cybersecurity, Encryption, Hacks, HIPAA, Incident Response, Insider Threats, Malware, Malware & Other Threats, Phishing, Regulatory, Risk Management, Vendor Compliance
Tags: , , , , , , , , , , , , , ,

Healthcare and the Role of Cybersecurity

Cybersecurity: Healthcare Organizations Can Learn from Mistakes

Suhail Nanji – Director, Eastern Region SMLR Group, Inc.

Healthcare entities have a lot at stake when it comes to cybersecurity. Sensitive patient data released into the public sphere puts everyone on edge.

Read more ›

Posted in Content, Cybersecurity, Encryption, Governent Oversight, Hacks, HIPAA, Incident Response, Insider Threats, Malware, Malware & Other Threats, Privacy, Privacy Laws, Regulatory, Risk Management, Vendor Compliance
Tags: , , , , , , , , , , ,

SureView: Compliance, Continuous Monitoring, and the Insider Threat

The Role of Continuous Monitoring in Compliance, and Combating the Insider Threat

thanks to: Dave Shackleford, Voodoo Security LLC

For security teams in many organizations, continuous monitoring is an ambiguous concept that originated in association with Federal Information System Management Act (FISMA) compliance.

Read more ›

Posted in Breach, Compliance, Content, Cybersecurity, Insider Threats, Regulatory, Risk Management, Vendor Compliance
Tags: , , , , , , , , ,

GHOST and Second Look

What is GHOST and How Can Second Look Protect You?

The GHOST vulnerability is a serious weakness in the Linux glibc library. It allows attackers to remotely take complete control of the victim system without having any prior knowledge of system credentials. CVE-2015-0235 has been assigned to this issue.

Read more ›

Posted in Compliance, Cyberattack, Cybersecurity, Malware & Other Threats, Risk Management, Vendor Compliance
Tags: , , , , , , , ,

Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Google Plus

Keep Current with What’s New in Cybersecurity

Email Address:

Name:


Cybersecurity News Daily

Provides a daily summary of what's news in Cybersecurity

Archives

Recent Tweets

Categories

Follow

Get every new post delivered to your Inbox

Join other followers: