Blog Archives

ODI Presents TrueCDR Anti-Malware Service for the Cloud

ODI Presents the First TrueCDRAnti-Malware Solution for MSSPs (managed security service providers )
As part of a company strategy to provide its TrueCDR™ anti-malware technology as-a-service, ODI announces a new version of the ODIX Kiosk especially designed for managed security service providers and distributed networks.

Read more ›

Posted in Cloud, Cybersecurity, Cyberthreat, Malware
Tags: , , , ,

Waratek Combats Zero-Day Exploits with Virtual Patching

Defeat Zero-Day Exploits BEFORE they Become a Breach

Each Zero-day combating security patch issued by Oracle, Microsoft, IBM, Apache or any software developer starts a relay race. One team is the malicious hackers who exploit new flaws to steal valuable data or take control of an important process.
The other runners are application security and development teams who need weeks,

Read more ›

Posted in Cybersecurity, Layered Defense, Zero-Day Exploits
Tags: , , , , ,

Cyberlitica Introduces DARK WEB Audit Applications For The Enterprise

iPhish Rebrands Under Cyberlitica, Launches New DARK WEB Audit Applications For The Enterprise
Cyberlitica Offers a New Workforce Threat Intelligence Application is Meeting Demand for Preventing Extortion, Ransomware and Data Breaches

New York, NY—May 4, 2018: the leading provider of outsourced cyber awareness training, is proud to announce that it is rebranding under the new name of Cyberlitica. 

Read more ›

Posted in cyber risk, Cyberthreat
Tags: , , , , ,

Cyber Risk Governance

The term “Cyber Risk Governance” is being used frequently. What is a good definition, and how does it differ from GRC?

by | Jan 23, 2017 | CYBERGOVERNANCE Journal – “Cyber Risk Governance is a Unique Discipline

Read more ›

Posted in Cyber Assessment, cyber risk, defense intelligence, Risk Management
Tags: , , , , ,

Cyber Threat Intelligence

How to Intelligently Share Cyber Threat Intelligence

A lot has been written on the importance of information sharing in the cybersecurity community. There is seemingly an ISAC for every industry these days.

Read more ›

Posted in Cybersecurity, defense intelligence, Layered Defense
Tags: , , , ,

Adaptive Multifaceted Cybersecurity

Cybersecurity Must Adapt to Today’s AND Tomorrow’s Threats

The RSA Conference last February brought together 40,000 of the brightest minds in cybersecurity, along with their products, promises and predictions.

Read more ›

Posted in Cybersecurity, Incident Response, Layered Defense, Risk Management
Tags: , , , , , , ,

Cyber Maturity Development

The Growing Mandate for Cyber Maturity Development

by | Sep 26, 2016 | CYBERGOVERNANCE Journal – “The Growing Mandate for Cyber Maturity Development”

Higher levels of risk to the economy and national security of the U.S.

Read more ›

Posted in cyber risk
Tags: , , , , , ,

FICO and Cyber Assessment

To FICO or Not to FICO: Choosing the Right Model for Cyber Assessment

by | Sep 12, 2016 | Cybergovernance Journal

Several companies offer unique versions of a “FICO-like” score to measure cyber risk,

Read more ›

Posted in cybergovernance, defense intelligence, Risk Management
Tags: , , , , , ,

Ransomware – Are You Prepared?

What is ransomware and how do you fight back?

You’re well aware of the magnitude of the ransomware problem. But did you know that, according to a November 2015 study from antivirus vendor Bitdefender, “half of victims are willing to pay up to $500 to recover their data.”

Read more ›

Posted in ransomware
Tags: , , , , , ,

Cybernance and Cybergovernance in the Enterprise

3 Ways to Cybernance Your Enterprise
What does it actually mean to manage and oversee cyber risk using a comprehensive cybergovernance framework?

by | Jul 18, 2016 | Cybergovernance Journal

In a recent customer conversation,

Read more ›

Posted in cybergovernance
Tags: , , , , , , , ,

Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Google Plus

Keep Current with What’s New in Cybersecurity

Email Address:


Cybersecurity News Daily

Provides a daily summary of what's news in Cybersecurity




Get every new post delivered to your Inbox

Join other followers: