Remove cyber-risk the-board-of-directors-will-see-you-now
article thumbnail

The False Economy of Deprioritising Security

IT Governance

In the UK, cyber security has been dropping down the board’s list of priorities. A 2022 Proofpoint study found that 76% of UK board members believed their organisation to be at risk of a material cyber attack in the next 12 months – higher than the global average of 65%. Specifically, a 13.4%

Security 116
article thumbnail

ROUNDTABLE: Huge Capital One breach shows too little is being done to preserve data privacy

The Last Watchdog

It’s going to be interesting to see who Capital One’s board of directors designates to throw under the bus on this one. Company officials at Capital One Financial Corp ought to have a crystal clear idea of what to expect next — after admitting to have allowed a gargantuan data breach.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind: Hacking Aerospace

ForAllSecure

Can you hack an airplane? Turns out that you can. And the fact that hackers are thinking about this now is a very good thing. ” “We are only two guys with one car, right so you know, we can't look at every car and we want to release this information because more people like us need to be focused on this problem.”

article thumbnail

GUEST ESSAY: Leveraging best practices and an open standard to protect corporate data

The Last Watchdog

It’s an irony often noted about wealth: The more money you have, the more you have to worry about money – managing it, protecting it, nurturing it for further growth. For businesses, the same is now true about information. Proliferating cyber challenges. One-half of corporate data is now stored in the cloud.

article thumbnail

New SEC Rules Require Breach Disclosure within Four Days

eSecurity Planet

Securities and Exchange Commission this week announced new rules mandating the disclosure of cybersecurity incidents as well as ongoing risk management, strategy, and governance. “Currently, many public companies provide cybersecurity disclosure to investors,” Gensler said.

article thumbnail

5 Trends in Patch Management for 2022

eSecurity Planet

See our picks for the Top Patch Management Tools. You might want to get permission from the server owner,” he said. “If If a reboot is required, this might need to be scheduled, and when the process is complete, you should be able to prove compliance.”. Yet, IT departments had failed to deploy them. Wider Patching Range.

article thumbnail

CyberheistNews Vol 13 #15 [The New Face of Fraud] FTC Sheds Light on AI-Enhanced Family Emergency Scams

KnowBe4

They started out with: "You get a call. But you can help by sending money. You take a deep breath and think. We're living with it, here and now. When the scammer calls you, he'll sound just like your loved one. "So So how can you tell if a family member is in trouble or if it's a scammer using a cloned voice? "So