Are Current Security Assurance Models Suitable for the Digital World?

A proactive security assurance model is a key enabler for delivering an effective operating model that encompasses the protection of people, processes and technology.

The post Are Current Security Assurance Models Suitable for the Digital World? appeared first on Security Intelligence.

Continue reading Are Current Security Assurance Models Suitable for the Digital World?

Third-party risk is broken, businesses unprepared for supply chain disruptions

Many companies are not dedicating proper resources to assess third-party risks, and those that are still lack confidence in their programs, according to Prevalent. Supply chain disruptions As a result, there are real consequences including loss of reve… Continue reading Third-party risk is broken, businesses unprepared for supply chain disruptions

How can you strengthen an enterprise third-party risk management program?

We sat down with Sean Cronin, CEO of ProcessUnity, to explore the challenges related to enterprise third-party risk today and in the future. What are the most unexpected pitfalls for a CISO that wants to strengthen an enterprise third-party risk manage… Continue reading How can you strengthen an enterprise third-party risk management program?

What’s preventing organizations from making pragmatic security decisions?

Human beings are poor judges of risk. For example, we perceive the risk of air travel to be higher than it actually is after a fatal aviation-related accident happens. We also tend to dismiss risks just because we don’t see a tangible negative im… Continue reading What’s preventing organizations from making pragmatic security decisions?

Too many alarms and too few security analysts? Think SOAR

Security automation, orchestration and response (SOAR) speeds up the incident response process by replacing manual tasks with automated workflows. We sat down with Swimlane CEO Cody Cornell to learn more about the benefits for all organizations. What a… Continue reading Too many alarms and too few security analysts? Think SOAR

Inadvertent Insider Threats Present a Unique Challenge to Organizations

While we may imagine inadvertent insider threats as careless people clicking on dodgy emails, this image needs to be updated to include a wide variety of poor security hygiene behaviors.

The post Inadvertent Insider Threats Present a Unique Challenge to Organizations appeared first on Security Intelligence.

Continue reading Inadvertent Insider Threats Present a Unique Challenge to Organizations

Safeguarding Healthcare for the Future With Zero Trust Security

A Zero Trust security model can help healthcare organizations provision access in a more effective manner by focusing on data, workloads and identity.

The post Safeguarding Healthcare for the Future With Zero Trust Security appeared first on Security Intelligence.

Continue reading Safeguarding Healthcare for the Future With Zero Trust Security

54% of healthcare vendors have experienced a data breach of protected health information

More than half of all healthcare vendors have experienced a data breach that exposed protected health information (PHI), and it’s a costly problem that points to broken third-party risk assessment processes, according to data released by the Ponemon In… Continue reading 54% of healthcare vendors have experienced a data breach of protected health information

Measuring Security Risk in a Medical IoT World

To reduce cybersecurity risk, silos among internet of things (IoT) technologies and hospital teams should be broken down and impact across four pillars should be weighed.

The post Measuring Security Risk in a Medical IoT World appeared first on Security Intelligence.

Continue reading Measuring Security Risk in a Medical IoT World