Today’s Risk Assessment Goes Beyond Prediction to Intelligence

Risk assessment helps organizations identify, reduce and manage risks to prevent their re-occurrence. To do this, they need to spend a large amount of their IT budget on technologies and processes to find and assess those risks, determine their impact and spend considerable effort to fix them.   Additionally, the increased reliance on third-party vendors to provide […]

The post Today’s Risk Assessment Goes Beyond Prediction to Intelligence appeared first on Security Intelligence.

Continue reading Today’s Risk Assessment Goes Beyond Prediction to Intelligence

Taking the Risk Out of Mergers and Acquisitions

In the post-COVID-19 economy, cyber risk and cybersecurity will play a central role in unlocking mergers and acquisitions (M&A) deal valuations. While economic uncertainty has contributed to a decline in M&A activity in the first half of 2020, many analysts expect an increase in deals during 2020-21 based on several conditions.  The Mergers and Acquisitions […]

The post Taking the Risk Out of Mergers and Acquisitions appeared first on Security Intelligence.

Continue reading Taking the Risk Out of Mergers and Acquisitions

Only 44% of healthcare providers conform to protocols outlined by the NIST CSF

Only 44% of healthcare providers, including hospital and health systems, conformed to protocols outlined by the NIST CSF – with scores in some cases trending backwards since 2017, CynergisTek reveals. Healthcare providers and NIST CSF Analysts ex… Continue reading Only 44% of healthcare providers conform to protocols outlined by the NIST CSF

How do I select a risk assessment solution for my business?

One of the cornerstones of a security leader’s job is to successfully evaluate risk. A risk assessment is a thorough look at everything that can impact the security of an organization. When a CISO determines the potential issues and their severit… Continue reading How do I select a risk assessment solution for my business?

Video Conferencing Security Tips You May Have Overlooked

Video conferencing applications grew substantially following the outbreak of the coronavirus (COVID-19) global pandemic. According to Research and Markets article “Video Conferencing Demand Rises due to Social-Distancing,” video conferencing software experienced 62 million downloads in March 2020. This increase in use resulted from businesses adopting video conferencing platforms as a means to facilitate their transition […]

The post Video Conferencing Security Tips You May Have Overlooked appeared first on Security Intelligence.

Continue reading Video Conferencing Security Tips You May Have Overlooked

Better cybersecurity hinges on understanding actual risks and addressing the right problems

SANS Technology Institute’s Internet Storm Center (ISC) has been a valuable warning service and source of critical cyber threat information to internet users, organizations and security practitioners for nearly two decades. Dr. Johannes Ullrich, … Continue reading Better cybersecurity hinges on understanding actual risks and addressing the right problems

Three Approaches to Cybersecurity Planning for Post-Pandemic Cloud Adoption

The global pandemic has been dictating how the whole world is reforming, businesses included. Different forums and analyst reports are increasingly calling out the future of businesses as they are moving their workloads to the cloud gradually. IDC “expects 2021 to be the year of multi-cloud” as the global COVID-19 pandemic reinforces the need for […]

The post Three Approaches to Cybersecurity Planning for Post-Pandemic Cloud Adoption appeared first on Security Intelligence.

Continue reading Three Approaches to Cybersecurity Planning for Post-Pandemic Cloud Adoption

Business Continuity: Planning for the Next Pandemic

Writing a business continuity plan will help safeguard your operations from unexpected events COVID-19 continues to change business operations in ways that would have been unimaginable at the start of 2020. Some of these changes will be permanent, whi… Continue reading Business Continuity: Planning for the Next Pandemic

Winning at Vulnerability Management: 8 Best Practices

To pre-empt cybersecurity threats, today’s enterprises must have policies, processes and tools in place to not only defend against attacks but also strengthen their security posture by reducing organizational risk. Vulnerability management (VM) progra… Continue reading Winning at Vulnerability Management: 8 Best Practices

Are you sure you would never fall for a phishing scam?

We believe we are less likely than others are to fall for phishing scams, thereby underestimating our own exposure to risk, a cybersecurity study has found. The research also reports that this occurs, in part, because we overlook data, or “base r… Continue reading Are you sure you would never fall for a phishing scam?