Best practices for implementing a company-wide risk analysis program

For most organizations today, the threat surface is broad and getting broader. There are the obvious concerns like the user base, remote or BYOD computing, on-premises infrastructure, and cloud, SaaS, and virtual environments. But as companies and supp… Continue reading Best practices for implementing a company-wide risk analysis program

Threat actors extend attack techniques to new enterprise apps and services

Perception Point announced the publication of a report, “The Rise of Cyber Threats Against Email, Browsers and Emerging Cloud-Based Channels“, which evaluates the responses of security and IT decision-makers at large enterprises and reveals numerous si… Continue reading Threat actors extend attack techniques to new enterprise apps and services

Key cybersecurity trends in the energy sector

The key trends for the energy industry are about how we manage the future supply and demand challenges at a much more granular level than we are currently able do. If we’re ever to balance the supply and demand equation against the backdrop of in… Continue reading Key cybersecurity trends in the energy sector

The biggest threat to America’s election system? Ourselves

With midterm elections right around the corner, many Americans are questioning whether they can trust the election process. To be honest, this is fair, given the highly publicized stories of foreign election interference over the last few years. Howeve… Continue reading The biggest threat to America’s election system? Ourselves

How to Effectively Manage Third-Party Supply Chain Risks

Third-party risks are widespread in the supply chain and can cause substantial damage. Loss of revenue and sensitive information, operational downtime, legal complications, compliance issues and damaged reputations can all arise from a single breach. If your company lacks a reliable third-party risk management plan, it’s almost impossible to bring in vendors without exposure to […]

The post How to Effectively Manage Third-Party Supply Chain Risks appeared first on Security Intelligence.

Continue reading How to Effectively Manage Third-Party Supply Chain Risks

For auto dealerships, cybersecurity is more essential than ever

Cybercriminals are getting craftier as auto retailers continue to fall victim to well-disguised cyberattacks. According to the second annual dealership cybersecurity study by CDK Global, 15% of dealers have experienced a cybersecurity incident in the p… Continue reading For auto dealerships, cybersecurity is more essential than ever

Smart buildings may be your cybersecurity downfall

According to a recent eEnergy report, 30 per cent of all purchased energy in the UK is currently wasted in commercial buildings, warehouses and education facilities. Whilst that’s quite a shocking number, it is, unfortunately, no surprise, as the major… Continue reading Smart buildings may be your cybersecurity downfall

Cybercriminals are having it easy with phishing-as-a-service

In this interview for Help Net Security, Immanuel Chavoya, Threat Detection Expert at SonicWall, talks about phishing-as-a-service (PaaS), the risks it can pose to organization, and what to do to tackle this threat. Phishing-as-a-service has become a g… Continue reading Cybercriminals are having it easy with phishing-as-a-service