Confessions of a Risk Assessor: 6 Things to Know Before a Cyber Security Assessment

The post Confessions of a Risk Assessor: 6 Things to Know Before a Cyber Security Assessment appeared first on Delta Risk.
The post Confessions of a Risk Assessor: 6 Things to Know Before a Cyber Security Assessment appeared first on Security Boulevard.
Continue reading Confessions of a Risk Assessor: 6 Things to Know Before a Cyber Security Assessment

Bumper to Bumper: Detecting and Mitigating DoS and DDoS Attacks on the Cloud, Part 2

With so much data being moved to the cloud, it’s more crucial than ever for companies to deploy advanced firewalls, anomaly detection and other defense mechanisms to mitigate the risk of DDoS attacks.

The post Bumper to Bumper: Detecting and Mitigating DoS and DDoS Attacks on the Cloud, Part 2 appeared first on Security Intelligence.

Continue reading Bumper to Bumper: Detecting and Mitigating DoS and DDoS Attacks on the Cloud, Part 2

The Cherry on Top: Add Value to Existing Risk Management Activities With Open Source Tools

Organizations with established risk management processes can drive efficiency and improve their overall risk posture by leveraging open source tools.

The post The Cherry on Top: Add Value to Existing Risk Management Activities With Open Source Tools appeared first on Security Intelligence.

Continue reading The Cherry on Top: Add Value to Existing Risk Management Activities With Open Source Tools

Risk Acceptance 101: What Happens When Security Needs Go Unfunded?

The refusal of top leadership to fund security initiatives often translates to explicit, willful risk acceptance.

The post Risk Acceptance 101: What Happens When Security Needs Go Unfunded? appeared first on Security Intelligence.

Continue reading Risk Acceptance 101: What Happens When Security Needs Go Unfunded?

Bumper to Bumper: Detecting and Mitigating DoS and DDoS Attacks on the Cloud, Part 1

Cybercriminals use DoS and DDoS attacks to distrupt services and take down networks and applications by sending overwhelming volumes of malicious traffic to target systems.

The post Bumper to Bumper: Detecting and Mitigating DoS and DDoS Attacks on the Cloud, Part 1 appeared first on Security Intelligence.

Continue reading Bumper to Bumper: Detecting and Mitigating DoS and DDoS Attacks on the Cloud, Part 1

When It Comes to Cyber Risks, 2018 Is No Time to Play Games

Security teams had best bring their A-game to compete against ever-more sophisticated threat actors as new cyber risks emerge and evolve in 2018.

The post When It Comes to Cyber Risks, 2018 Is No Time to Play Games appeared first on Security Intelligence.

Continue reading When It Comes to Cyber Risks, 2018 Is No Time to Play Games

Three Pitfalls to Avoid on Your Data Security Journey

The EU General Data Protection Regulation (GDPR) has called for enterprises to assess existing data security policies and procedures. What does this mean for your organization’s efforts?

The post Three Pitfalls to Avoid on Your Data Security Journey appeared first on Security Intelligence.

Continue reading Three Pitfalls to Avoid on Your Data Security Journey

ISO 27001 risk assessments: The problem with using spreadsheets

An ISO 27001 risk assessment is at the core of your organisation’s information security management system (ISMS). Those new to tackling this complex step may rely on using a manual, inexpensive solution such as spreadsheets, but there are many di… Continue reading ISO 27001 risk assessments: The problem with using spreadsheets

DHS leaders push cybersecurity risk assessment program for critical infrastructure companies

Secretary of Homeland Security Kirstjen Nielsen is pitching a new supply chain cybersecurity program in an effort to engage with some of the country’s largest critical infrastructure providers, including the oil, electric and water treatment industries. “Our nation’s supply chain is being targeted by our most sophisticated adversaries with increasing regularity,” Nielsen said Thursday to a room full of people representing private sector companies.  “We ask for you to work with us on this initiative … the goal of this initiative is to help stakeholders make better informed procurement decisions by providing them with supply chain risk assessment and mitigation recommendations.” The program is focused on DHS authoring and providing digital risk assessments to companies and government agencies about products that they may acquire or install on their systems. The move comes after the federal government banned the use of Moscow-based Kaspersky Labs’ anti-virus software across government systems. In addition, legislation […]

The post DHS leaders push cybersecurity risk assessment program for critical infrastructure companies appeared first on Cyberscoop.

Continue reading DHS leaders push cybersecurity risk assessment program for critical infrastructure companies

Understanding our risk assessment software

Our sales and support executive Gary Baxter, has produced an extended demonstration video for our risk assessment software vsRisk 3.0. The aim of the video is to walk you through the software and help you decide whether it’s the right product for… Continue reading Understanding our risk assessment software