The first step to being cybersmart: Just start somewhere

When it comes to a subject as complex as cybersecurity, it’s easy to become a victim of decision paralysis. When company leaders and IT staff begin looking at their options around improving their security and discover hundreds of possible solutions, th… Continue reading The first step to being cybersmart: Just start somewhere

What You Need to Know About Data Security Heading into 2022

Every business needs an effective data security strategy. Over the past year alone, 64% of companies worldwide faced some form of cyber attack, with an average cost of $4.24 million per breach — the highest ever recorded.  Modern enterprises must ensure that their systems can resist unauthorized access, stop data breaches and remain secure (while […]

The post What You Need to Know About Data Security Heading into 2022 appeared first on Security Intelligence.

Continue reading What You Need to Know About Data Security Heading into 2022

Which technologies can help legal and compliance teams navigate a changing landscape of risk?

In this interview with Help Net Security, Zack Hutto, Director of Advisory Services at Gartner‘s Legal and Compliance Practice, talks about the challenges legal and compliance teams are facing and the technologies that can help them. What are tod… Continue reading Which technologies can help legal and compliance teams navigate a changing landscape of risk?

How collaboration between IT pros and senior leaders could drive the future of risk mitigation

What is an acceptable level of risk for IT pros and their organizations? The answer to this question has changed in recent years, with the threat landscape shifting dramatically both due to global events and the increasing sophistication of the attacks… Continue reading How collaboration between IT pros and senior leaders could drive the future of risk mitigation

Assessing subsidiary risk a top priority for most enterprises, yet they still lack proper visibility

Most enterprises are overconfident and lack the proper visibility to manage subsidiary risk, according to an Osterman Research study. The study surveyed enterprises with more than $1 billion in annual revenue and an average of more than 19 subsidiaries… Continue reading Assessing subsidiary risk a top priority for most enterprises, yet they still lack proper visibility

Protecting your company from fourth-party risk

In a world that is becoming ever more interconnected, organizations are learning firsthand that they are not only vulnerable to the adverse events that their vendors experience but also to the incidents that happen to those vendors’ vendors. Recent eve… Continue reading Protecting your company from fourth-party risk

How to Quantify the Actual Cost of a Data Breach for Your Own Organization

As business leaders, we need to know what the biggest risks to our organizations are. All organizations face numerous disruptive challenges in today’s business environment that can create significant new business opportunities, but also can increase potential cybersecurity risks to the organizations. To address these issues, we need to focus our scarce resources on those […]

The post How to Quantify the Actual Cost of a Data Breach for Your Own Organization appeared first on Security Intelligence.

Continue reading How to Quantify the Actual Cost of a Data Breach for Your Own Organization

Ransomware and cyber insurance: What are the risks?

High-profile ransomware events, such as the Colonial Pipeline and Kaseya attacks, continue to create eye-popping headlines about how easily a cybercriminal group can cripple key infrastructure, hospitals, and schools. And with ransomware attacks growin… Continue reading Ransomware and cyber insurance: What are the risks?

How One Application Test Uncovered an Unexpected Opening in an Enterprise Call Tool

Working as security consultants is highly rewarding. Companies depend on us to view their environment from the perspective of an attacker and find vulnerabilities that could enable threats to succeed. One of the most impactful parts of our role is when we’re the first to find a major vulnerability that could lead to a widespread […]

The post How One Application Test Uncovered an Unexpected Opening in an Enterprise Call Tool appeared first on Security Intelligence.

Continue reading How One Application Test Uncovered an Unexpected Opening in an Enterprise Call Tool