article thumbnail

Best Practices Q&A: Guidance about what directors need to hear from CISOs — from a board member

The Last Watchdog

I recently attended an IoActive-sponsored event in Seattle at which Pegueros gave a presentation titled: “Merging Cybersecurity, the Board & Executive Team” Pegueros shed light on the land mines that enshroud cybersecurity presentations made at the board level. Pigueros: Compliance is not going to fix all the security risks.

article thumbnail

FTX Collapse Highlights the Cybersecurity Risks of Crypto

eSecurity Planet

Ray has wasted little time in assembling a top-notch team, which includes an unnamed cybersecurity forensics firm. ” Also read : Web3 Cybersecurity: Are Things Getting Out of Control? Crypto can also be a way to leverage cybersecurity breaches. One way is through hijacking computer resources to mine cryptocurrencies.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 10 Governance, Risk and Compliance (GRC) Vendors

eSecurity Planet

Governance, risk, and compliance (GRC) software helps businesses manage all of the necessary documentation and processes for ensuring maximum productivity and preparedness. It includes multi-disciplinary risk and compliance management solutions and tools, including: IT & security risk management. Compliance management.

article thumbnail

SHARED INTEL: Here’s one way to better leverage actionable intel from the profusion of threat feeds

The Last Watchdog

Related: ‘Cyber Pearl Harbor’ is upon us There are dozens technology giants, cybersecurity vendors, government agencies and industry consortiums that identify and blacklist IP addresses and web page URLs that are obviously being used maliciously; and hundreds more independent white hat hackers are doing much the same.

article thumbnail

Q&A: Why SOAR startup Syncurity is bringing a ‘case-management’ approach to threat detection

The Last Watchdog

SOAR, if you haven’t heard, is a hot new technology stack that takes well-understood data mining and business intelligence analytics methodologies — techniques that are deeply utilized in financial services, retailing and other business verticals – and applies them to cybersecurity. LW: How does ‘compliance’ factor in?

article thumbnail

First American Financial Pays Farcical $500K Fine

Krebs on Security

“The rule broadly requires firms involved in securities issuance to have a compliance process in place to assure material information follows securities laws,” Satran wrote. Reporting for Reuters Regulatory Intelligence , Richard Satran says the SEC charged First American with violating Rule 13a-15(a) of the Exchange Act.

Insurance 276
article thumbnail

ShadowRay Vulnerability: 6 Lessons for AI & Cybersecurity

eSecurity Planet

Hijacked compute: Repurposes expensive AI compute power for attackers’ needs, primarily cryptojacking, which mines for cryptocurrencies on stolen resources. Those that continue to assume secure systems will suffer data compliance breaches and other damages. You can unsubscribe at any time.