Implementing a strategic planning process is key to drive future revenue growth

While many long term plans were put off due to the COVID-19 pandemic, executive leaders should act now in implementing a strategic planning process for future revenue growth, according to Gartner. Organizations must actively prepare to respond to futur… Continue reading Implementing a strategic planning process is key to drive future revenue growth

The cybersecurity of industrial companies remains low, potential damage can be severe

Positive Technologies released a research that examines information security risks present in industrial companies, the second-most targeted sector by cybercriminals in 2020. Among key findings, an external attacker can penetrate the corporate network … Continue reading The cybersecurity of industrial companies remains low, potential damage can be severe

Critical vulnerabilities may allow attackers to compromise hospitals’ pneumatic tube system

Armis researchers have unearthed critical vulnerabilities in Swisslog Healthcare’s Translogic pneumatic tube system, which plays a crucial role in patient care in more than 3,000 hospitals worldwide (including 80% of hospitals in North America). … Continue reading Critical vulnerabilities may allow attackers to compromise hospitals’ pneumatic tube system

Navigating the complexity of ransomware negotiations

Most ransomware attacks are opportunistic, and at the end of the day, cybercriminals do not discriminate. Nobody plans to fall victim, but the fact is any company with an internet presence, regardless of size, is at risk. These incidents cause signific… Continue reading Navigating the complexity of ransomware negotiations

Most organizations would pay in the event of a ransomware attack

Despite the Director of the FBI, the US Attorney General and the White House warning firms against paying cyber-related ransoms, 60 percent of organizations have admitted they would shell out funds in the event of an attack, according to a research fro… Continue reading Most organizations would pay in the event of a ransomware attack

Understanding the cloud shared responsibility model

Over the past year, we witnessed a transition to the cloud as companies had to quickly adjust to the almost instantaneous move to a remote work environment. But in many cases, they prioritized practicality over security to avoid business disruption, le… Continue reading Understanding the cloud shared responsibility model

Banks accelerating their risk management transformation

COVID-19’s disruption has stretched risk management infrastructures to the brink, forcing banks to recalibrate their data, models and processes for stress testing, impact assessments, scenario analyses and more. A global risk management survey by SAS a… Continue reading Banks accelerating their risk management transformation

Despite the pandemic, 85% of organizations completed their audits as planned

While COVID-19 was a tectonic shift for businesses, compliance programs were largely unimpacted, according to a report by A-LIGN. In fact, cybersecurity teams have compelling opportunities to consolidate audit operations and leverage technology to acce… Continue reading Despite the pandemic, 85% of organizations completed their audits as planned

Trends and technologies that are helping supply chains respond, recover and thrive during pandemic

Nearly half of supply chain leaders surveyed have dramatically accelerated spending on digital technologies to make their operations more responsive and forward-looking during the pandemic, according to an industry report released by MHI and Deloitte. … Continue reading Trends and technologies that are helping supply chains respond, recover and thrive during pandemic

Attackers disrupting COVID-19 efforts and critical supply chains

Cyberattacks evolved in 2020 as threat actors sought to profit from the unprecedented socioeconomic, business and political challenges brought on by the COVID-19 pandemic, IBM Security reveals. In 2020 attackers were observed pivoting their attacks to … Continue reading Attackers disrupting COVID-19 efforts and critical supply chains