article thumbnail

RSAC insights: Malware is now spreading via weaponized files circulating in data lakes, file shares

The Last Watchdog

Lots of innovation has come down the pike with respect to imbuing zero trust into two pillars of security operations: connectivity and authentication. Votiro’s new cloud services fit as a pillar of zero trust that is now getting more attention: directly protecting digital content in of itself. But that needs to change, he says.

article thumbnail

Managed IT Service Providers (MSPs): A Fast Way to Secure IT

eSecurity Planet

While MSPs also provide a wide range of business services, here we’ll focus on managed IT and cybersecurity service providers. For IT services and infrastructure, some larger MSPs will provide generalist services and attempt to solve all problems.

IT 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Managed IT Service Providers (MSPs): A Fast Way to Secure IT

eSecurity Planet

While MSPs also provide a wide range of business services, here we’ll focus on managed IT and cybersecurity service providers. For IT services and infrastructure, some larger MSPs will provide generalist services and attempt to solve all problems.

IT 97
article thumbnail

Proposed Amendments to NY Financial Services Cybersecurity Regulations Impose New Obligations on Large Entities, Boards of Directors and CISOs

Hunton Privacy

Covered entities also must conduct an “impact assessment whenever a change in the business or technology causes a material change in the covered entity’s cyber risk.” The risk assessments required by Section 500.9

article thumbnail

NYDFS proposes significant cybersecurity regulation amendments

Data Protection Report

To the extent passwords are employed as a method of authentication, the proposed changes would require the covered entity to ensure strong, unique passwords are used. The draft amendments would also require that relevant employees be trained for their implementation. Notifications to DFS. Cybersecurity Event Notification Would Expand.