strategy
How financial services firms are handling data privacy
One-third of financial services organizations lack a clear plan or the resources to address privacy risks related to customer data in the next 12 months, according to a report …
Playing the infinite game with threat intelligence and cyber fusion
“We can know only that we know nothing. And that is the highest degree of human wisdom.” ― Leo Tolstoy, War and Peace. True wisdom, as Leo Tolstoy remarked, lies in …
Why ransomware continues to knock on healthcare’s door, enter, and create havoc
My name is Adam, and I’ve worked in the healthcare industry for over 15 years. In my current line of work, I assist healthcare facilities across the U.S. with their overall …
Coronavirus: You don’t get a pass when it comes to cybersecurity
I was saddened to learn that two people who attended RSAC 2020 in San Francisco had subsequently tested positive for COVID-19. This virulent disease has impacted our lives …
How organizations can maintain a third-party risk management program from day one
In this podcast recorded at RSA Conference 2020, Sean Cronin, CEO of ProcessUnity, talks about the importance of third-party risk management and how companies can get started …
Three actions to boost your organization’s resilience against coronavirus disruptions
With the spread of the coronavirus (COVID-19), CIOs should focus on three short-term actions to increase their organizations’ resilience against disruptions and prepare for …
How to begin tapping the full value of your data
By making better use of data, leading organizations had materially increased revenue and reduced operational costs, boosting profitability by an average of 12.5% of their …
The haphazard response to COVID-19 demonstrates the value of enterprise risk management
Just 12% of more than 1,500 respondents believe their businesses are highly prepared for the impact of coronavirus, while 26% believe that the virus will have little or no …
Economic impact and perceptions around the cybersecurity gender gap
If the number of women working in cybersecurity in the United States equalled that of men, the economic footprint of the U.S. cybersecurity industry would increase by $30.4 …
Rising threats call for primary cyber resilience, new strategies for governments
Cybercriminals are holding governments hostage more frequently, expanding their attack base, and asking for more money, according to a report released by Deloitte. The study …
Coronavirus as an opportunity to evolve security architecture
Fear of coronavirus infections has resulted in organizations ruling out large meetings. Healthy individuals are in home-quarantine for weeks at a time, even though they are …
DNS over HTTPS misuse or abuse: How to stay secure
Firefox and Chrome have recently begun supporting external DNS resolvers in the cloud. The use of these DNS services bypasses controls that enterprise IT organizations put in …
Featured news
Resources
Don't miss
- LiteLLM PyPI packages compromised in expanding TeamPCP supply chain attacks
- Training an AI agent to attack LLM applications like a real adversary
- You don’t have to choose between BAS or automated pentesting, you shouldn’t
- Why your phishing simulations aren’t building a security culture
- Your security stack looks fine from the dashboard and that’s the problem