Blog Archives

The First 100 Days – Trump and Cybersecurity

Cybergovernance: 3 Initiatives for the First 100 Days

by | Nov 14, 2016

A new administration’s priorities are often set within its first 100 days. What should the new administration do to help the country achieve greater levels of cyber maturity and risk mitigation?

Read more ›

Posted in Cyberattack, Cybersecurity, Encryption, Governance, Legal, Privacy, ransomware, Regulatory, Risk Management
Tags: , , , , , , , , , , ,

Cyber Maturity Development

The Growing Mandate for Cyber Maturity Development

by | Sep 26, 2016 | CYBERGOVERNANCE Journal – “The Growing Mandate for Cyber Maturity Development”

Higher levels of risk to the economy and national security of the U.S.

Read more ›

Posted in cyber risk
Tags: , , , , , ,

Fixing America’s Failing Cybersecurity

Fixing America’s Failing Cybersecurity

by | Mar 28, 2016 | For Cybergovernance Journal

A shortage of cybersecurity know-how is a genuine problem – but if we don’t apply what we know,

Read more ›

Posted in Cybersecurity, defense intelligence, Financials, Governent Oversight, Regulatory, Risk Management
Tags: , , , , , ,

Encryption Isn’t Going Away

Encryption App Gains Popularity Amid Apple Privacy Battle

By Steve Rosenbush for WSJ

The battle between Apple Inc. and the FBI over an encrypted iPhone used by one of the San Bernardino terrorists could be meaningful to that particular investigation. Perhaps, if the FBI wins, and Apple unencrypts the phone,

Read more ›

Posted in Content, Cybersecurity, Encryption, Governance, Governent Oversight, Government Surveilance, ID Theft, Layered Defense, Legal, Regulatory, spyware
Tags: , , , , , , , , , , ,

Data Breach Planning 101

Data Breach Planning in 10 Easy Steps: How to Think Like A Litigator

When you have a breach, it’s not just the clients whose information has been stolen you’ll have to answer to… it’s their lawyers… and the regulatory agencies… and THEIR lawyers… and the media… and the court of public opinion.

Read more ›

Posted in Breach, Compliance, Content, Incident Response, Legal, Risk Management
Tags: , , , , , , , ,

Chilling Effect Impact

Surveillance, First Amendment Rights and the “Chilling Effect”

by Curt Monash of The Monash Report

In which I observe that Tim Cook and the EFF, while thankfully on the right track, haven’t gone nearly far enough.

Traditionally, the term “chilling effect” referred specifically to inhibitions on what in the US are regarded as First Amendment rights — the freedoms of speech,

Read more ›

Posted in Content, Governent Oversight, Government Surveilance, Incident Response, Legal, Privacy, Privacy Laws, Regulatory, Risk Management
Tags: , , , , , , , , , ,

Law Firm Cybersecurity and Privacy Risks

Law Firm Catastophic Risks at an 11 out of 10

by: Prof. Daniel Solove

Law firms are facing grave privacy and security risks. Although a number of firms are taking steps to address these risks, the industry as a whole needs to grasp the severity of the risk.

Read more ›

Posted in Compliance, Cybersecurity, Incident Response, Insider Threats, Layered Defense, Legal, Malware, Risk Management
Tags: , , , , , , , , , , , , ,

BYOD and Mobile Apps

The security threat of BYOD and unvetted mobile apps

by Suhail Nanji, Area Director, Southeast Region, SMLR Group

It’s likely happening in your organization, whether you have an official policy or not. Employees are probably running software applications on their own mobile devices or employer-issued devices to access company information.

Read more ›

Posted in Compliance, Content, Cybersecurity, Hacks, Incident Response, Insider Threats, Malware, Malware & Other Threats, Mobile, Regulatory, Vendor Compliance
Tags: , , , , , , , , , , ,

The NIST Framework: Why SMBs Should Care About It

In a previous blog post, Suhail Nanji covered the ins and outs of the National Institute of Standards and Technology (NIST) Framework, a document that helps SMBS assess risk, create better cybersecurity measures and improve their performance. While the core outcomes, implementation tiers, and profiles are the three primary components of the Framework that walk SMBs through the process of increasing cybersecurity,

Read more ›

Posted in Compliance, Content, Cybersecurity, Governent Oversight, Risk Management
Tags: , , , , , , , ,

Surveillance Environment Impacts the Way Companies do Business

“Snowden Effect” Causes Companies to Alter their Email Services

by Michael Hickins, Wall Street Journal

Business and consumer wariness of surveillance has pushed two of the world’s largest companies to make significant changes to their email services. Microsoft Corp. has decided to change its policies for accessing customer email after the company faced scrutiny for searching a user’s Hotmail email account to investigate a leak of company software,

Read more ›

Posted in Compliance, Encryption, Governent Oversight, Government Surveilance, Privacy, Privacy Laws, Regulatory
Tags: , , , , , , ,

Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Google Plus

Keep Current with What’s New in Cybersecurity

Email Address:


Cybersecurity News Daily

Provides a daily summary of what's news in Cybersecurity


Recent Tweets



Get every new post delivered to your Inbox

Join other followers: