Blog Archives

Hedge Fund Third Party Cybersecurity Risk

Is Your Administrator a Cybersecurity Risk Weak Point?

Apr 5 2016 | 6:45pm ET | Risk

Editor’s Note: Alternative investment managers know that risk comes in all shapes and sizes, and most have very detailed ways of quantifying and dealing with them. However, cyber risk often flies below the radar,

Read more ›

Posted in attack surface, Cybersecurity, defense intelligence, Financials, Insider Threats, Risk Management
Tags: , , , , ,

Cybersecurity Attack Surface – Part 1

Redefining The Cybersecurity Attack Surface, Part 1

by | Jan 4, 2016 | CYBERGOVERNANCE Journal

When discussing an organization’s security posture, “attack surface” is the common term used to describe the aggregate vulnerabilities that the firm exhibits.

Read more ›

Posted in cybergovernance, Cybersecurity, Fraud, Governance, Hacks, ID Theft, Malware, Malware & Other Threats, Phishing, ransomware, Regulatory, Risk Management
Tags: , , , , , , , , , ,

The True Cost of A Cyber Attack: EVERYTHING

A cyber attack can cost you everything… and more

by Kirsten Charlton and Chad J. Layton, Segal McCambridge Singer & Mahoney

Imagine you’re preparing for your second round of funding and Brian Krebs calls you asking if you were aware your company has suffered a cyber attack.

Read more ›

Posted in Breach, Content, Cybersecurity, Data Security, Financials, Hacks, Insider Threats, Risk Management
Tags: , , , , , , ,

Half of Companies Know They’re Breached

47 Percent of Companies Were Breached in the Past Two Years

And 65 percent believe threat intelligence could have prevented or minimized the impact of those breaches, according to a recent survey.

By Jeff Goldman for eSecurity Planet

According to a recent survey of 692 IT and IT security professionals,

Read more ›

Posted in Breach, Compliance, Content, Cybersecurity, Incident Response, Layered Defense, Risk Management, Trojan
Tags: , , , , , , , , , , , ,

Lost Devices Can Lead to Breaches

Lost electronic devices can lead to data breaches

by Mark Pribish for Merchants Information Solutions, Inc.
lost_deviceslost_devicesNearly half of all data breaches occur when ID-theft criminals access information because someone lost a device.
In fact, 41 percent of all data breach events from 2005 through 2015 were caused by lost devices such as laptops,

Read more ›

Posted in Breach, Compliance, Content, Encryption, Fraud, Incident Response, Insider Threats, Mobile, Risk Management
Tags: , , , , , , , , ,

Protecting your Business Against Insider Threats

Insider Threat: Protecting Your Business and Your Data

Businesses today thrive on connectivity. However, easily/remotely accessible networks come with numerous well-documented security risks, particularly from malicious cyber attacks.

Read more ›

Posted in Breach, Compliance, Content, Cybersecurity, Insider Threats, Layered Defense, Risk Management
Tags: , , , , , , , , ,

Impact of Data Breach on Your Business

Only by understanding the real impact of a data breach on business can companies protect themselves

by James Pattinson, Vice President, EMEA, Absolute

The concept of a data breach is becoming worryingly common to anyone with even a passing interest in the news.

Read more ›

Posted in Breach, Compliance, Content, Cybersecurity, Financials, Hacks, Insider Threats, Legal, Risk Management
Tags: , , , , , , , , , , ,

Courts Punish Non-Compliant Security

Compliant Security is Key to Mitigating Fines and Penalties in a Breach

By for InfoWorld

Doing security right (compliant) is cheaper than trying to recover from a data breach — and the stakes keep getting higher. Recent moves by the courts indicate that organizations are expected to take adequate security measures to protect user data;

Read more ›

Posted in Breach, Compliance, Content, Cybersecurity, Governent Oversight, Legal, Regulatory
Tags: , , , , , ,

Data Breach Weak Link – YOU

We’ve Seen the Face of the Modern Data Breach, And It’s Us

By | Sep 15, 2015 for CMS WiRE

Let’s start with a tired metaphor: “Storing crown jewels outside of castle walls.”

Read more ›

Posted in Breach, Compliance, Content, Cybersecurity, Financials, Hacks, Incident Response, Insider Threats, Risk Management
Tags: , , , , , , ,

Data Breach and Compliance

By | Sep 10, 2015 for CMS WiRE

If you’re still harboring illusions of data privacy,

Read more ›

Posted in Breach, Compliance, Governent Oversight, Insider Threats, Layered Defense, Legal, Regulatory, Risk Management
Tags: , , , , , , ,

Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Google Plus

Keep Current with What’s New in Cybersecurity

Email Address:


Cybersecurity News Daily

Provides a daily summary of what's news in Cybersecurity


Recent Tweets



Get every new post delivered to your Inbox

Join other followers: