Blog Archives

Waratek Combats Zero-Day Exploits with Virtual Patching

Defeat Zero-Day Exploits BEFORE they Become a Breach

Each Zero-day combating security patch issued by Oracle, Microsoft, IBM, Apache or any software developer starts a relay race. One team is the malicious hackers who exploit new flaws to steal valuable data or take control of an important process.
The other runners are application security and development teams who need weeks,

Read more ›

Posted in Cybersecurity, Layered Defense, Zero-Day Exploits
Tags: , , , , ,

Regulatory Compliance in the Cloud

Regulatory Compliance in Action and in the Cloud – Sharing Responsibility and Ensuring Compliance

Choosing to upload your data to the cloud is, for the most part, a moot point; the advantages of mobility,

Read more ›

Posted in Cloud, Compliance, Governance, Regulatory
Tags: , , , , ,

The Role of Cyber Due Diligence

Private Equity Firms Need Cyber Due Diligence

by | Nov 28, 2016 | “Private Equity Firms Need Cyber Due Diligence”

Verizon’s pending acquisition of Yahoo highlights a substantial risk faced by all private equity firms: how much cyber risk will the next transaction add to their portfolio?

Read more ›

Posted in Cyber Assessment, Data Security, Financials, Legal
Tags: , , , , , , , , ,

Cyber Risk and D&O

How Will Cyber Risk Evolve D&O?

by | Oct 24, 2016 | Cybernance – Cybergovernance Journal “How Will Cyber Risk Evolve D&O”

“Prudent board candidates have long demanded that directors’ and officers’ insurance be in place before accepting a board seat,

Read more ›

Posted in cyber risk, Cyber-Insurance, cybergovernance, Risk Management
Tags: , , , ,

Cyber Insurance and Cybersecurity – An Uncommon Model

Who’ll Be the Gap Closer in Cyber Insurance?

by | Jun 27, 2016  |  The CYBERGOVERNANCE Journal

A common model and vocabulary can close the chasm between the cybersecurity and cyber insurance communities,

Read more ›

Posted in Cyber-Insurance, Cybersecurity
Tags: , , , , ,

Cyber Legislation

“We are facing a crisis of confidence that is eroding the public’s trust in our markets, and poses a real threat to our economic health… The strain on the economy is deep and spreading.”

Posted in cybergovernance, Governent Oversight, Incident Response, Legal, Regulatory
Tags: , , , , , , ,

Holistic Cybersecurity through Cyber Analytics

Achieving Holistic Cybersecurity in Government and the Enterprise through Cyber Analytics

To be effective in their security efforts, agencies and enterprises must be proactive — using cyber analytics and cognitive-based systems to develop true security intelligence.

By John Lainhart, Christopher M. Ballister | May 12,

Read more ›

Posted in cybergovernance, Cybersecurity, Governance, Layered Defense, Risk Management
Tags: , , , , , , ,

Hedge Fund Third Party Cybersecurity Risk

Is Your Administrator a Cybersecurity Risk Weak Point?

Apr 5 2016 | 6:45pm ET | Risk

Editor’s Note: Alternative investment managers know that risk comes in all shapes and sizes, and most have very detailed ways of quantifying and dealing with them. However, cyber risk often flies below the radar,

Read more ›

Posted in attack surface, Cybersecurity, defense intelligence, Financials, Insider Threats, Risk Management
Tags: , , , , ,

Cyber Risk Compliance

What’s the Half-Life of Cyber Risk Compliance?

by | Apr 11, 2016

To understand the value of your organization’s cyber risk assessment, it’s important to understand how long it will remain accurate.

Read more ›

Posted in Compliance, cyber risk, Cybersecurity, Risk Management
Tags: , , , , ,

Risk and the Board

Increasing Board Engagement with Cyber Risk

by | Mar 21, 2016

Last week in our nation’s capital we met with several key players who are working to get a better handle on cyber risk.

Read more ›

Posted in Compliance, cybergovernance, Cybersecurity, Governance, Risk Management, Vendor Compliance
Tags: , , , , ,

Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Google Plus

Keep Current with What’s New in Cybersecurity

Email Address:

Name:


Cybersecurity News Daily

Provides a daily summary of what's news in Cybersecurity

Archives

Recent Tweets

Categories

Follow

Get every new post delivered to your Inbox

Join other followers: