Assess Your Risks

We talk a lot about phishing, vishing, smishing, and impersonation here at SECOM, and there is a good reason for that. Those are the primary services we provide as a company for our clients. Not all clients use all of our services, and some companies d… Continue reading Assess Your Risks

78% of customers won’t go back to a breached organisation

A Ping Identity study has revealed that 78% of consumers would no longer use a retailer’s website if it had suffered a data breach. Ping’s 2018 Consumer Survey, which polled more than 3,000 people across Europe and the US, also found that: … Continue reading 78% of customers won’t go back to a breached organisation

Board Directors Can’t Afford to Ignore Cybersecurity Risk

As businesses rush to adopt emerging technologies such as AI, blockchain and big data, board directors must increase their engagement around cybersecurity risk.

The post Board Directors Can’t Afford to Ignore Cybersecurity Risk appeared first on Security Intelligence.

Continue reading Board Directors Can’t Afford to Ignore Cybersecurity Risk

A new taxonomy for SCADA attacks

Attacks aimed at SCADA networks are still much rarer than those targeting IT networks, but the number is slowly rising. And, according to Radiflow CTO Yehonatan Kfir, there’s no time like the present to start using a consistent, evidence-based ta… Continue reading A new taxonomy for SCADA attacks

NIST releases guidance for risk assessment automation

Security professionals are stretched as thin as you can imagine. Their environments are fragmenting from just their data centers to a multitude of cloud services. Meanwhile, they’re having difficulty finding skilled staff, and their development t… Continue reading NIST releases guidance for risk assessment automation

The System Development Life Cycle: A Phased Approach to Application Security

By completing the phases of the system development life cycle (SDLC), security teams can integrate processes and technologies into the development process and improve application security.

The post The System Development Life Cycle: A Phased Approach to Application Security appeared first on Security Intelligence.

Continue reading The System Development Life Cycle: A Phased Approach to Application Security

Your Security Strategy Is Only as Strong as Your Cyber Hygiene

Without full network visibility and regular utilization of cyber hygiene best practices, your enterprise could face very real, but entirely preventable, security risks.

The post Your Security Strategy Is Only as Strong as Your Cyber Hygiene appeared first on Security Intelligence.

Continue reading Your Security Strategy Is Only as Strong as Your Cyber Hygiene

Why Proactive Data Compliance Is Imperative for Secure Digital Transformation

The risks associated with failure to establish proactive data compliance go far beyond regulatory violations and loss of consumer trust. Compliance is critical for secure digital transformation.

The post Why Proactive Data Compliance Is Imperative for Secure Digital Transformation appeared first on Security Intelligence.

Continue reading Why Proactive Data Compliance Is Imperative for Secure Digital Transformation

Understanding the 7 different types of data breaches

Every day more than 6 million data records are compromised, with no organisation or sector immune. Organisations are facing a data breach war so it’s imperative that ‘know your enemy’ becomes part of their battle tactics. Data br… Continue reading Understanding the 7 different types of data breaches

Two thirds of organisations uninsured against a data breach

Two thirds of UK organisations are uninsured against the financial impact of a data breach, a survey has revealed. NTT Security’s Risk:Value 2018 report found that only 29% of organisations have dedicated cyber insurance in place, despi… Continue reading Two thirds of organisations uninsured against a data breach