Blog Archives

Approaches to Cybersecurity

Taking a Multifaceted Approach to Cybersecurity

By Samuel Greengard  |  Posted 2016-09-20 | Baseline – Cybersecurity

As the threat landscape grows, there’s a need to take a proactive approach that incorporates multilayered security,

Read more ›

Posted in Cybersecurity, Data Security, defense intelligence, Layered Defense, Risk Management
Tags: , , , , , ,

Risk and the Board

Increasing Board Engagement with Cyber Risk

by | Mar 21, 2016

Last week in our nation’s capital we met with several key players who are working to get a better handle on cyber risk.

Read more ›

Posted in Compliance, cybergovernance, Cybersecurity, Governance, Risk Management, Vendor Compliance
Tags: , , , , ,

Secure? Says Who?

Standards define if you are secure… but they have to be applied

by | Feb 29, 2016

If you’re a board member concerned about cyber risk,

Read more ›

Posted in attack surface, Compliance, Content, cybergovernance, Cybersecurity, Governance, Risk Management
Tags: , , , , , , , , ,

The Fed and Cybergovernance

Is the Government Using Its Own Cybergovernance Standards?

by | Feb 15, 2016 | For Cybergovernance Journal

The recent announcement of another IRS cyber breach raises this question: are agencies embracing and applying government cybersecurity standards?

Read more ›

Posted in Breach, Compliance, cybergovernance, Cybersecurity, defense intelligence, Governance, ID Theft, Regulatory, Risk Management
Tags: , , , , , , , , , , , ,

Cybernance – First in Cybergovernance

Read more ›

Posted in Compliance, Content, Cyber-Insurance, cybergovernance, Cybersecurity, Governance, Governent Oversight
Tags: , , , , , , , ,

Universal Model of Cyber Risk – Part 4

A Universal Model for Assessing Cyber Risk Part 4: Toward a Universal Cybergovernance Model

by | Dec 28, 2015 | for Cybergovernance Journal

Part 1 examined how the increasing incidence of cyber breaches is bringing significant pressure on corporate directors to assume more oversight of cyber risk In Part 2 we contrasted the rise of cybergovernance (cybersecurity governance) with the history of financial governance following the passage of the Sarbanes-Oxley Act.

Read more ›

Posted in cybergovernance, Cybersecurity, Hacks, Incident Response, Layered Defense, Risk Management
Tags: , , , , , ,

Cybergovernance – The Key to Cybersecurity

Needed: A Shared Cybergovernance Model

My own theory is that we are in the middle of a dramatic and broad technological and economic shift in which software companies are poised to take over large swathes of the economy.

Read more ›

Posted in Content, cybergovernance, Cybersecurity, Governance, Incident Response, Layered Defense, Risk Management
Tags: , , , ,

Universal Model of Cyber Risk – Part 1

A Universal Model for Assessing Cyber Risk Part 1: More Than a Technology Problem

by | Dec 7, 2015 | for Cybergovernance Journal

This is the first post in a four-part discussion of the need for a universal model for assessing cyber risk.

Read more ›

Posted in Compliance, cybergovernance, Cybersecurity, Governance, Risk Management
Tags: , , , , ,

Mobile Security and YOU

Mobile Devices and Your Security – Beyond Simple BYOD

By Michael O’Shaughnessy

Here is a question I bet you have never asked yourself; is your smartphone secure? I don’t mean a password, although that is important, I mean using an actual anti–virus/malware app. If you have some type of scanning app loaded on your phone congratulations,

Read more ›

Posted in Content, Cybersecurity, Hacks, ID Theft, Mobile
Tags: , , , , , , ,

Surviving the Data Breach – Part 2

The Top 3 Mistakes Businesses Make After a Breach

by: Carly Okyle, October 29, 2015

Rajesh De (pronounced Day) knows a thing or two about cybersecurity.

Read more ›

Posted in Breach, Compliance, Content, Cybersecurity, Governent Oversight, Incident Response, Legal, Regulatory, Risk Management
Tags: , , , , , , , ,

Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Google Plus

Keep Current with What’s New in Cybersecurity

Email Address:

Name:


Cybersecurity News Daily

Provides a daily summary of what's news in Cybersecurity

Archives

Recent Tweets

Categories

Follow

Get every new post delivered to your Inbox

Join other followers: