Blog Archives

SMBs Are the “Target of Choice” for Hackers

Five Reasons Hackers are Targeting SMBs

by Steve Nice – 06/15/2017 – “Five Reasons Hackers are Targeting SMBs”

Larger organizations dominate the headlines when it comes to cybercrime, but it is the small and medium-sized business (SMBs) that are becoming the primary targets and are bearing the brunt of most attacks.

Read more ›

Posted in Cyberattack, Cybersecurity, Governance, Risk Management
Tags: , , , ,

The Role of Cyber Due Diligence

Private Equity Firms Need Cyber Due Diligence

by | Nov 28, 2016 | “Private Equity Firms Need Cyber Due Diligence”

Verizon’s pending acquisition of Yahoo highlights a substantial risk faced by all private equity firms: how much cyber risk will the next transaction add to their portfolio?

Read more ›

Posted in Cyber Assessment, Data Security, Financials, Legal
Tags: , , , , , , , , ,

Cyber Assessment and the Cost of a Breach

The Billion Dollar NIST Assessment

by | Oct 10, 2016 | CYBERGOVERNANCE Journal | “The Billion Dollar NIST Assessment”

The billion-dollar Yahoo hack vividly illustrates why cyber risk mitigation must start from the top down and why board members should insist on getting the actionable information they need.

Read more ›

Posted in Breach, Cyber Assessment, cyber risk, Risk Management
Tags: , , , ,

Adaptive Multifaceted Cybersecurity

Cybersecurity Must Adapt to Today’s AND Tomorrow’s Threats

The RSA Conference last February brought together 40,000 of the brightest minds in cybersecurity, along with their products, promises and predictions.

Read more ›

Posted in Cybersecurity, Incident Response, Layered Defense, Risk Management
Tags: , , , , , , ,

Cyber Maturity Development

The Growing Mandate for Cyber Maturity Development

by | Sep 26, 2016 | CYBERGOVERNANCE Journal – “The Growing Mandate for Cyber Maturity Development”

Higher levels of risk to the economy and national security of the U.S.

Read more ›

Posted in cyber risk
Tags: , , , , , ,

Regulatory Scrutiny – No Breach Required

Security Vulnerabilities: You Don’t Need a Breach to Face Regulatory Scrutiny

Those who track newsworthy data breaches and other cybersecurity incidents know what type of fallout to expect from these events.

Read more ›

Posted in Breach, Compliance, Incident Response, Regulatory, Risk Management
Tags: , , , ,

Don’t Make These Cybersecurity Mistakes

5 Cybersecurity Blunders Companies Should Avoid

By Shawn Henry, CSO, CrowdStrike | – “5 Cybersecurity Blunders Companies Should Avoid”

Cybersecurity requires a holistic organizational approach. From all corners of the organization, a concerted effort must be maintained to establish, execute, and follow through with a plan to address cyber-risk management.

Read more ›

Posted in cybergovernance, Cybersecurity, Incident Response, Risk Management
Tags: , , , , , ,

Cybernance and Cybergovernance in the Enterprise

3 Ways to Cybernance Your Enterprise
What does it actually mean to manage and oversee cyber risk using a comprehensive cybergovernance framework?

by | Jul 18, 2016 | Cybergovernance Journal

In a recent customer conversation,

Read more ›

Posted in cybergovernance
Tags: , , , , , , , ,

Ransomware Explained

Ransomware seems to be everywhere right now.

Read more ›

Posted in Malware, Ransomware, Risk Management
Tags: , , , , , , , ,

Cyber Risk Governance

Operational Excellence Through Cyber Risk Governance

by Jul 11, 2016  |  Cybergovernance Journal

Continuously monitoring and enhancing the cybersecurity infrastructure that supports online services will improve operational excellence.

Read more ›

Posted in cyber risk, cybergovernance, Risk Management
Tags: , , , ,

Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Google Plus

Keep Current with What’s New in Cybersecurity

Email Address:


Cybersecurity News Daily

Provides a daily summary of what's news in Cybersecurity


Recent Tweets



Get every new post delivered to your Inbox

Join other followers: