Why are so many CIOs leaving the NHS?

Last November, Health Secretary Matt Hancock told NHS chiefs: “If you haven’t got your CIO on board then you need to be asking serious questions of yourself.” Hancock argued that CIOs were vital to developing the necessary systems an… Continue reading Why are so many CIOs leaving the NHS?

Third-Party Risks Need New Approaches

Businesses need to adopt a strategic approach to managing third-party risks that provides an integrated view of the vendor relationship process.

The post Third-Party Risks Need New Approaches appeared first on Security Intelligence.

Continue reading Third-Party Risks Need New Approaches

Is ISO 27001 accreditation worth it?

Have you ever wondered whether your organisation should become certified to ISO 27001? ISO 27001 provides the specification for an effective ISMS (information security management system) – a framework that offers a structured, comprehensive appro… Continue reading Is ISO 27001 accreditation worth it?

The Cybersecurity Industry’s Third-Party Risk Management Problem Is Rooted in Visibility

Only one-third of organizations feel their processes for third-party risk management are effective. The root of the issue lies in visibility and ineffective process.

The post The Cybersecurity Industry’s Third-Party Risk Management Problem Is Rooted in Visibility appeared first on Security Intelligence.

Continue reading The Cybersecurity Industry’s Third-Party Risk Management Problem Is Rooted in Visibility

Political parties are still struggling with cybersecurity basics

Political parties in Europe and the U.S. have cybersecurity practices that fail to meet basic standards, leaving them vulnerable to hackers and foreign influence operations with elections rapidly approaching, according to security researchers. An assessment of 29 political parties in 11 countries released Tuesday by SecurityScorecard found that a party in France relies on end-of-life technology that has not had a security update in four to five months, for example. There also is a strain of malicious software emanating from an IP address assigned to an economic subcommittee of the European Union in Brussels right now, SecurityScorecard’s Director of Threat Intelligence, Paul Gagliardi, tells CyberScoop. And while American political parties tend to fare better than European political parties, according to the report, the Democratic National Committee and the Republican National Committee still have weak spots. Malware in the EU The details of the report arrive just as the European Parliament elections kick off Thursday. The malware SecurityScorecard […]

The post Political parties are still struggling with cybersecurity basics appeared first on CyberScoop.

Continue reading Political parties are still struggling with cybersecurity basics

Five warning signs you are at risk of a data breach

Data breaches are one of the biggest threat to organisations today. They can bring operations to a grinding halt, drastically damage your reputation and your relationship with customers, and cause severe financial losses from lost sales, remediation an… Continue reading Five warning signs you are at risk of a data breach

Microsoft’s Attack Surface Analyzer now works on Macs and Linux, too

Microsoft has rewritten and open-sourced Attack Surface Analyzer (ASA), a security tool that points out potentially risky system changes introduced by the installation of new software or configuration changes. About Attack Surface Analyzer The initial … Continue reading Microsoft’s Attack Surface Analyzer now works on Macs and Linux, too

What is SecOps? (and What are the Benefits and Best Practices?)

Security should be considered from the get-go across the business and development lifecycle. But how to get started in SecOps? Find out here!
The post What is SecOps? (and What are the Benefits and Best Practices?) appeared first on Security Boulevard.
Continue reading What is SecOps? (and What are the Benefits and Best Practices?)

Banking – Building trust in an age of disruption

Digital disruption has long made its presence felt in the retail banking sector. A series of challenger brands have launched in recent years, building innovative and intuitive digital interfaces from the ground up and in some cases forgoing physical pr… Continue reading Banking – Building trust in an age of disruption

Every organisation is affected by cyber risk!

Organisations that believe they can ignore cyber risk management and the benefits it offers will probably lose out as others adopt more efficient, more economical, less human-resource-intensive solutions. For effective cyber risk management, an or… Continue reading Every organisation is affected by cyber risk!