Insights on Mitigating Ransomware Risks
Data Breach Today
MAY 21, 2021
Janine Darling, the founder and CEO of STASH Global, discusses the pervasive and persistent problem of ransomware and how to mitigate the risks
Data Breach Today
MAY 21, 2021
Janine Darling, the founder and CEO of STASH Global, discusses the pervasive and persistent problem of ransomware and how to mitigate the risks
Data Breach Today
MAY 17, 2022
Many experts advise organizations to pivot from a maturity-based approach to a risk-based approach to cybersecurity. Tia Hopkins, field CTO and chief cyber risk strategist at eSentire, discusses where the maturity-based approach falls short and how a risk-based approach can help organization
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Data Breach Today
MAY 13, 2022
Memo to CISOs: Risk of Attack Spillover - If Not Direct Attacks - Remains Notable As the Russia-Ukraine war continues, cybersecurity officials say the risk of attack spillover - and perhaps the direct targeting of critical infrastructure sectors outside Ukraine - remains high.
Data Breach Today
JANUARY 25, 2023
Venminder CEO James Hyde on Reducing Risk Exposure From Vendor Relationships With breaches on the rise and the average cost of a healthcare breach reaching a staggering $10.1 million in 2022, third-party risk management is a growing concern in the healthcare industry.
Advertisement
This paper will discuss why organizations frequently end up with multiple data copies and how a secure "no-copy" data strategy enabled by the Dremio data lake service can help reduce complexity, boost efficiency, and dramatically reduce costs.
Data Breach Today
MARCH 15, 2022
Book Excerpt: Peter Gregory on Ignoring the Risk In an excerpt from his book "CRISC Certified in Risk and Information Systems Control All-In-One Exam Guide," Peter Gregory discusses choosing the fifth option in risk management, which is ignoring the risk.
Data Breach Today
MAY 26, 2021
William Dixon of World Economic Forum on Improving Infrastructure To unlock the value of quantum computing, two systemic risks - tech governance and cybersecurity - need to be overcome, says William Dixon of the World Economic Forum
Data Breach Today
JANUARY 19, 2023
Steve Harvey on Why Boards Want to Understand the Risk Factors, Not Just the Rating Security ratings provide a strong indication of potential risk, but boards increasingly want to drill into the underlying risk factors, says CEO Steve Harvey.
Data Breach Today
SEPTEMBER 22, 2020
CEOs and CISOs on Assessing and Mitigating the New Risk Landscape It might be new, but are we ready to call this "normal?"
Data Breach Today
JANUARY 26, 2023
Dragos CEO: Unpatched Vulnerabilities Less of a Problem in OT Than Outsiders Think The increased physical connectivity of digital assets has expanded the attack surface and added complexity for engineers in industrial environments, says Dragos CEO Robert Lee.
Speaker: William Hord, Vice President of ERM Services
Join us as we discuss the various tangents of data and the change management process that will help you make better risk-based business decisions to save time and money for your organization.
Data Breach Today
JUNE 10, 2021
New Stand-Alone Firm Is Tasked With Combatting Digital Commerce Fraud RSA Security LLC has spun off its fraud and risk intelligence business into a stand-alone company named Outseer.
Data Breach Today
APRIL 21, 2022
Recent security incidents involving third-party software, including Okta and Log4j, underscore the importance of healthcare entities taking steps to enhance their vendor risk management programs, says Chris Frenz, assistant vice president of IT security at Mount Sinai South Nassau
Data Breach Today
AUGUST 3, 2022
Supply chain risk must be part of an enterprisewide risk management program framework, says information security manager Matt Marciniak of financial service firm Quantile. Reducing risk requires an agile approach to supplier management, he says
Data Breach Today
JUNE 17, 2022
DXC Technology's Michael Baker on Top Threats, Recruitment Tips, Career Advice Threat watch: The ongoing Russia-Ukraine war continues to pose both direct and indirect risks to enterprise networks, says Michael Baker, vice president and IT CISO of IT services and consulting firm DXC Technology.
Speaker: Anita Lauper Wood, Product Strategist
Successful implementation of predictive analytics can feel unpredictable. There are risks that need to be consciously addressed, and successful implementation requires the right strategy. Join Anita Lauper Wood, Product Strategist, for a valuable session for product and technology leaders.
Schneier on Security
OCTOBER 5, 2020
A Study on Usability and Security Perceptions of Risk-based Authentication “: Abstract : Risk-based Authentication (RBA) is an adaptive security measure to strengthen password-based authentication. I’ve blogged about risk-based authentication before.
Data Breach Today
DECEMBER 5, 2022
Robin Love of Early Warning on How to Look at Fraud Risk Holistically Application fraud has spiked - particularly bogus new accounts - and organizations are scrambling to improve fraud detection mechanisms without negatively affecting the legitimate customer's experience.
Dark Reading
SEPTEMBER 22, 2022
SecurityScorecard's ROI Calculator helps organizations quantify cyber-risk to understand the financial impact of a cyberattack
Data Breach Today
MARCH 22, 2022
The integration of third-party components and software is an increasingly critical area of security risk that needs more attention from medical device manufacturers, says Anura Fernando, global head of medical device security at safety certification and consulting firm UL
Speaker: Ronald Eddings, Cybersecurity Expert and Podcaster
In this webinar, Ronald Eddings, Cybersecurity Expert, will outline the relationship between SaaS apps and IT & security teams, along with several actionable solutions to overcome the new difficulties facing your organization.
Data Breach Today
JANUARY 18, 2023
AI Tools are Tempting Productivity Aides for Clinicians, But What Are the Patient Data Risks? What are the risks
Data Breach Today
DECEMBER 14, 2022
When healthcare organizations come together through mergers or acquisitions, it is critical for the entities to carefully assess the cyber risk each poses, as well as its level of cyber maturity, says Jigar Kadakia, CISO and chief privacy officer at Boston-based Mass General Brigham
Security Affairs
JANUARY 17, 2023
How healthcare delivery organizations (HDOs) can manage the IT asset risks during a healthcare M&A process. And with new assets come new risks. An M&A should be a time for organizational improvement, not increased cyber security risks.
Data Breach Today
JANUARY 23, 2023
Legislation requiring vendors to design cybersecurity into their medical devices is a great first step to help healthcare entities, but organizations will still face major risks involving legacy medical gear for many years to come, says Daniel dos Santos, research leader at security firm Forescout
Speaker: Shlomo Bielak, CTO, Benchmark Corp
Shifting security left to the earliest part of development is currently in the spotlight in the developer world. What teams are now discovering is, this approach results in misdirected ownership for developers and a frustrated security team. In the current climate, we cannot afford to let security implementations falter. It's time to manage your team's energies to maximize DevOps efficiency, all the while maintaining top security standards. Join Shlomo Bielak, and learn how to keep your DevSecOps team focused and connected without creating silos.
Data Breach Today
AUGUST 31, 2022
CISOs have enough tools to identify security weaknesses, says Yoran Sirkis, but they need a way to make the information those tools gather more accessible and to streamline the remediation process. The CEO of Seemplicity discusses how its platform can help security leaders manage remediations
Data Breach Today
JANUARY 13, 2023
CISO Marco Túlio Moraes on Cybersecurity and the Rise of the Stakeholder Theory Since Elon Musk became Twitter's CEO, cyber risks have affected the social media company in technological, financial, regulatory and reputational ways.
Dark Reading
DECEMBER 5, 2022
Instead, focus on finding and minimizing the greatest risks Preventing all data breaches is an unrealistic goal.
Schneier on Security
DECEMBER 2, 2022
The risks we face today are existential in a way they never have been before. Uncategorized complexity risks security analysisWe know that complexity is the worst enemy of security, because it makes attack easier and defense harder.
Speaker: Chris McLaughlin, Chief Marketing Officer and Chief Product Officer, Nuxeo
After 20 years of Enterprise Content Management (ECM), businesses still face many of the same challenges with finding and managing information. Join Chris McLaughlin, CMO and CPO of Nuxeo, as he examines four common business challenges that these legacy ECM systems pose and how they can be addressed with a more modern approach.
Data Breach Today
SEPTEMBER 13, 2022
Federal Authorities Urge Healthcare Sector Entities to Take Caution A host of emerging technologies - including artificial intelligence, 5G cellular, quantum computing, nanomedicine and smart hospitals - offer the potential to revolutionize healthcare, but organizations must carefully evaluate the security risks, federal authorities warn.
Data Breach Today
APRIL 12, 2022
The Risk — And the Threat — Is Real Hackers are exploiting third-party remote access. If you’re not taking third-party risk seriously, it’s just a matter of time until your company is the next headline
Data Breach Today
JUNE 23, 2022
Kelly White of RiskRecon on Assessing Suppliers' Cyber Hygiene Ransomware has changed the risk landscape for suppliers and is forcing companies to reconsider their risk relationships, says Kelly White, co-founder and CEO of RiskRecon.
Data Breach Today
AUGUST 19, 2020
The growing use of biometric technology is raising concerns about privacy as well as identity theft and fraud, says attorney Paul Hales, who reviews recent legal and legislative developments
Data Breach Today
JUNE 16, 2022
BitSight's Stephen Boyer Says Regulations Are Driving Better Board-Level Awareness How can companies make their cybersecurity posture more transparent to stakeholders? That's a question being asked by both boards of directors and potential investors, says Stephen Boyer, founder and CTO of BitSight.
Data Breach Today
AUGUST 19, 2022
The extremely diverse architectures and systems within the tens of thousands of very specialized types of medical devices used in clinical settings adds to the complexity healthcare organizations and manufacturers face in managing cybersecurity risk for these products, says Phil Englert of H-ISAC
Data Breach Today
NOVEMBER 16, 2020
ENISA Releases Guidance on Reducing IoT Supply Chain Risk IoT devices are like sausages: They're full of components of varying quality, and it's invariably disturbing to think about their origins.
Data Breach Today
JANUARY 3, 2023
Digital Assets Likely 'Inconsistent With Safe and Sound Banking Requirements' U.S.
Data Breach Today
JANUARY 12, 2023
healthcare sector organizations better tackle some of the top challenges involving vendor risk management, a coalition of CISOs has launched the Health3PT Council. To help U.S.
Let's personalize your content