Blog Archives

FICO and Cyber Assessment

To FICO or Not to FICO: Choosing the Right Model for Cyber Assessment

by | Sep 12, 2016 | Cybergovernance Journal

Several companies offer unique versions of a “FICO-like” score to measure cyber risk,

Read more ›

Posted in cybergovernance, defense intelligence, Risk Management
Tags: , , , , , ,

Holistic Cybersecurity through Cyber Analytics

Achieving Holistic Cybersecurity in Government and the Enterprise through Cyber Analytics

To be effective in their security efforts, agencies and enterprises must be proactive — using cyber analytics and cognitive-based systems to develop true security intelligence.

By John Lainhart, Christopher M. Ballister | May 12,

Read more ›

Posted in cybergovernance, Cybersecurity, Governance, Layered Defense, Risk Management
Tags: , , , , , , ,

The Board, Cyber Risk, and Governance

What Boards Need to Govern Cyber Risk: A Conversation with Ralph Hasson

by | May 9, 2016 |Cybergovernance Journal

In a recent conversation,

Read more ›

Posted in cyber risk, cybergovernance, Regulatory, Risk Management
Tags: , , , , ,

Hedge Fund Third Party Cybersecurity Risk

Is Your Administrator a Cybersecurity Risk Weak Point?

Apr 5 2016 | 6:45pm ET | Risk

Editor’s Note: Alternative investment managers know that risk comes in all shapes and sizes, and most have very detailed ways of quantifying and dealing with them. However, cyber risk often flies below the radar,

Read more ›

Posted in attack surface, Cybersecurity, defense intelligence, Financials, Insider Threats, Risk Management
Tags: , , , , ,

SMLR and MIS Launch Partnership

SMLR Group and Merchants Information Solutions, Inc.
Announce a New Strategic Partnership

New Strategic Partnership brings Merchants industry leading SmartIDentity for Business Data Breach Solution to SMLR Group clients.

February 11th, 2016 SMLR Group Press Release – SMLR Group and Merchants Information Solutions,

Read more ›

Posted in Compliance, Content, Customer Engagement, Cyber-Insurance, Cybersecurity, Data Security, Partnerships, Privacy, Risk Management
Tags: , , , , , , ,

The Fed and Cybergovernance

Is the Government Using Its Own Cybergovernance Standards?

by | Feb 15, 2016 | For Cybergovernance Journal

The recent announcement of another IRS cyber breach raises this question: are agencies embracing and applying government cybersecurity standards?

Read more ›

Posted in Breach, Compliance, cybergovernance, Cybersecurity, defense intelligence, Governance, ID Theft, Regulatory, Risk Management
Tags: , , , , , , , , , , , ,

Vendor Compliance and Third Party Risk

5 Best Practices for Reducing Vendor & Third-Party Security Risks

Vendors and other third-party partners have caused some big data breaches. Here is how to keep it from happening to you.

By Jeff Goldman  | Posted February 08, 2016

With security breaches now a regular fixture in the news,

Read more ›

Posted in attack surface, Breach, Compliance, Content, cybergovernance, Cybersecurity, Data Security, Hacks, Insider Threats, Risk Management, Vendor Compliance
Tags: , , , , , ,

2016: The Year of Cybergovernance

2016 Is The Year of Cybergovernance: How Directors Can Protect Themselves and Their Companies

by | Jan 25, 2016 | Cybernance – First in Cybergovernance

Beijing is accelerating the Chinese economy by short-circuiting the time and cost of innovation.

Read more ›

Posted in Breach, Cyberattack, cybergovernance, Data Security, Governance, Hacks, Incident Response, Legal, Risk Management
Tags: , , , , , , , ,

Half of Companies Know They’re Breached

47 Percent of Companies Were Breached in the Past Two Years

And 65 percent believe threat intelligence could have prevented or minimized the impact of those breaches, according to a recent survey.

By Jeff Goldman for eSecurity Planet

According to a recent survey of 692 IT and IT security professionals,

Read more ›

Posted in Breach, Compliance, Content, Cybersecurity, Incident Response, Layered Defense, Risk Management, Trojan
Tags: , , , , , , , , , , , ,

Information Security A Concern

Add information security to your data, privacy concerns

by: Mark Pribish, Vice President and ID-theft Practice Leader at Merchants Information Solutions Inc.

Can you really trust the information that is in your desktop, laptop or smart device? I encourage you to re-think any trust you might have,

Read more ›

Posted in Compliance, Content, Cybersecurity, Data Security, Insider Threats, Layered Defense, Risk Management
Tags: , , , , , , , ,

Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Google Plus

Keep Current with What’s New in Cybersecurity

Email Address:

Name:


Cybersecurity News Daily

Provides a daily summary of what's news in Cybersecurity

Archives

Recent Tweets

Categories

Follow

Get every new post delivered to your Inbox

Join other followers: