The Impact of COVID-19 on Cybersecurity Strategies

Data Breach Today

Joe Nocera and Vikas Agarwal Analyze PwC Survey Findings The 2021 PwC Global Digital Trust Insights survey shows 96% of businesses will adjust their cybersecurity strategies as a result of the COVID-19 pandemic.

Strategies for Fighting Synthetic ID Fraud

Data Breach Today

People’s United Bank’s Karen Boyer on Using Consumers' Devices for Authentication To mitigate the fraud risks posed by synthetic IDs, banks should use consumers' devices to help with authentication, says Karen Boyer, vice president of financial crimes and fraud intelligence at People’s United Bank, based in Connecticut.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Insights on Revamping Recovery Strategies

Data Breach Today

Experts at Dell Technologies and Unisys Discuss Current Threats and Best Security Practices In a joint video interview, David Finley at Dell Technologies and Andrew Peters at Unisys offer insights on enterprise strategies for disaster recovery and cyber recovery in light of emerging threats

5 Objectives for Establishing an API-First Security Strategy

Dark Reading

With APIs predicted to be the most common attack vector by 2022, an API-first security strategy is critical now more than ever

Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.

Synthetic ID Fraud: Risk Mitigation Strategies

Data Breach Today

Meridian Credit Union's Saif Nawaz on Using New Technologies As synthetic ID fraud in the financial services sector continues to rise next year, organizations must use new technologies to mitigate the risks, says Saif Nawaz of Meridian Credit Union in Canada

Risk 187

Tips on Ransomware Defense Strategies

Data Breach Today

Caleb Barlow, CEO of CynergisTek, on Addressing the Challenges Healthcare institutions and nonprofits are suffering badly from ransomware attacks, says Caleb Barlow, CEO of CynergisTek, who offers insights on shoring up defenses

Australia to Update National Cybersecurity Strategy

Data Breach Today

Government Invites Feedback on Addressing Cyber Challenges The Australian government is looking to update its national cybersecurity strategy by 2020. In preparation, it's released a discussion paper that seeks input from citizens, the business community, academics and other stakeholders

Strategies for Securing Digital Transformation

Data Breach Today

PJ Maloney of DXC Technology and William "Buck" Houston of Micro Focus Global Alliances weigh in on new strategies for securing the transformation PJ Maloney and William 'Buck' Houston on Steps to Bolster Cyber Defense Digital transformation is the buzz across all sectors, but it poses significant security risks to enterprises.

Building an Effective Ransomware Mitigation Strategy

Data Breach Today

Crowdstrike's Jennifer Ayers on Understanding the Indicators of Attacks To mitigate the risks posed by ransomware attacks, enterprises need to move from file-based security to a behavior-based approach, says Jennifer Ayers, vice president of the OverWatch division of Crowdstrike

How ZoomInfo Enhances Your Database Management Strategy

Forward-thinking marketing organizations have continuously invested in a database strategy for enabling marketing processes. Download this ebook to learn how to maintain a strategy that includes refreshed information, database cleanses, and an accurate analysis at the same time.

Tips on Building a Robust Data Backup Strategy

Data Breach Today

In light of the threat of ransomware attacks, healthcare organizations need to take extra steps to ensure their systems are adequately backed up - and that those backups are protected, says Martin Littmann of Kelsey-Seybold Clinic.

How to Develop a Metadata Strategy

AIIM

What’s the Importance of a Metadata Strategy? To avoid this, organizations should develop a metadata strategy. Many organizations use metadata in ways that provide significant business value. Every system uses metadata to store and retrieve data.

Fileless Malware: What Mitigation Strategies Are Effective?

Data Breach Today

Security Practitioners Highlight Ways to Fight Against the Threat As the threat of fileless malware continues to persist worldwide, security professionals are devising targeted risk management strategies

Risk 144

Tips for a Bulletproof War Room Strategy

Dark Reading

The techniques used in real-world combat apply in cybersecurity operations, except that instead of bullets flying downrange, it's packets

What We Learned From Our Own Data-Driven ABM Strategy

ZoomInfo has created the following eBook to help other B2B organizations gain insights on how to launch their own data-driven ABM strategy. In this eBook, we will reveal the good and the bad from our own campaign and highlight some key takeaways on how to improve your ABM strategies moving forward.

'Five Eyes' Intelligence Agencies Discuss Strategies

Data Breach Today

The latest edition of the ISMG Security Report describes a discussion among "Five Eyes" intelligence agencies at the recent CyberUK conference. Plus, an update on a Huawei 'backdoor' allegation and new research on managing third-party risk

Risk 184

Smart City: Bridging Strategy and Governance in a Smart City

Information Governance Perspectives

The post Smart City: Bridging Strategy and Governance in a Smart City appeared first on Rafael Moscatel. If we cower in the face of disruption, our ideas will get stale, our skillsets will grow old, and our energy to adapt will precipitously decline.

Patch Management as a Risk Management Strategy

Data Breach Today

Chris Hallenbeck of Tanium Discusses Good Security Hygiene Significant security events have many techniques in common, says Chris Hallenbeck of Tanium, who describes why security hygiene improvement, especially patch management, is so essential

Risk 157

The Bucketing Strategy as a Precautionary Solution

The Texas Record

Careful consideration of the connections between certain records in a retention schedule, anticipation of problems that may arise, and preparation to prevent those issues, such as using the bucketing strategy, will contribute to a more efficient, solid records management system.

2020 Database Strategies and Contact Acquisition Survey Report

As buyer expectations continue to heighten, marketing and sales teams are feeling pressured to deliver authentic messaging to buyers at every point of their customer journey. This report aims to highlight the current state of B2B database and contact acquisition strategies, and organizations’ goals to leverage data to fuel their go-to-market strategies in 2020 and beyond.

Japan's IoT Security Strategy: Break Into Devices

Data Breach Today

Nation to Allow Researchers to Brute-Force 200 Million Devices Japan plans to identity vulnerable internet of things devices the same way hackers do: by trying to log into them. The country wants to gauge its cybersecurity readiness for next year when it hosts the summer Olympics. If vulnerable devices are found, the plan is to notify device owners

IoT 177

UK emphasises cyber security in new foreign policy strategy

IT Governance

Under the new strategy, the government says it’s prepared to launch nuclear attacks if the country faced an exceptional threat that used cyber weapons or other “emerging technologies”. UK cyber security strategy.

Developing a Cloud Adoption Strategy in Healthcare

Perficient Data & Analytics

In my last blog of this series, I examine how to develop a cloud adoption strategy and best practices. Three steps to cloud journey: Establish Strategy and Goals: Help engage senior members of IT and business leaders to understand all aspects of cloud and multiple options and approaches.

Cloud 61

EDPB Publishes Its 2021-2023 Strategy

Hunton Privacy

On December 21, 2020, the European Data Protection Board (the “EDPB”) released its 2021-2023 Strategy (the “Strategy”). According to the Strategy, the EDPB will also provide further guidance on data protection by design and by default as well as on accountability.

Testing at Every Stage of Development

Up to 80% of new products fail. The reality is harsh and the reasons why are endless. Perhaps the new product couldn’t oust a customer favorite. Maybe it looked great but was too hard to use. Or, despite being a superior product, the go-to-market strategy failed. There’s always a risk when building a new product, but you can hedge your bets by understanding exactly what your customers' expectations truly are at every step of the development process.

Is your SaaS pricing strategy optimized?

Information Matters

The post Is your SaaS pricing strategy optimized? Getting the pricing right for a SaaS product right is a potential minefield. Charge too little and it can be difficult to raise prices while still retaining customers later or Read more. appeared first on Information Matters.

IT 52

7 Security Strategies as Employees Return to the Office

Dark Reading

More sooner than later, employees will be making their way back to the office. Here's how security pros can plan for the next new normal

8 Tips to Create a Data Migration Strategy

AIIM

Then you’ll definitely need to create a successful data migration strategy to protect your valuable data and achieve the desired results. They will allow you to build a successful strategy, prevent data loss, and make everything as efficient as possible.

A Fraud-Fighting Strategy for P2P Payments

Data Breach Today

Customer lifecyle data management can play an important role in cracking down on fraud tied to the growth in real-time P2P payments, says David Barnhardt of the security firm GIACT

How ZoomInfo Enhances Your ABM Strategy

For marketing teams to develop a successful account-based marketing strategy, they need to ensure good data is housed within its Customer Relationship Management (CRM) software. More specifically, updated data can help organizations outline key accounts for their campaigns. And to begin the targeting process, marketing teams must develop an Ideal Customer Profile (ICP) with appropriate firmographic and behavioral data to ensure they’re going after the correct audience.Download this eBook to learn how to start improving your marketing team's data!

Brazilian Data Protection Authority Publishes Regulatory Strategy for 2021 – 2023

Hunton Privacy

On January 28, 2021, international Data Privacy Day, the newly formed Brazilian data protection authority ( Agência Nacional de Proteção de Dados , the “ANPD”) published its regulatory strategy for 2021-2023 and work plan for 2021-2022 (in Portuguese). ANPD Regulatory Strategy.

Securing IoT as a Remote Workforce Strategy

Dark Reading

Digital transformation with Internet of Things devices offers organizations a way forward in the era of COVID-19. Optimizing this approach for the future will need to start with security

DarkCrewFriends Returns with Botnet Strategy

Threatpost

The botnet can be used to mount different kinds of attacks, including code-execution and DDoS. Malware Vulnerabilities Web Security botnet Check Point code execution Content Management Systems darkcrewfriends file upload vulnerability php servers zero-day

4 Tips for Implementing a Mature Endpoint Security Strategy

Data Breach Today

Insights on Vulnerability Management and Incident Response An effective endpoint security strategy can be as layered as you want it to be. But you'll have a strong foundation if you build off of these four key steps

Marketing-Led Post-COVID-19 Growth Strategies

Businesses are laying off workers, shutting their doors (some permanently), and struggling to react to the radical destruction that coronavirus (COVID-19) is doing to our society and communities. However, there’s no team better suited to lead that charge than the marketing department.

The Reaction to New White House Cybersecurity Strategy

Data Breach Today

Leading the latest edition of the ISMG Security Report: The reaction to the recently released White House cybersecurity strategy. Also featured: A discussion of GDPR's impact on class action lawsuits

GDPR 126

Building Cybersecurity Strategies in Sub-Saharan Africa

Dark Reading

Evelyn Kilel and Laura Tich of Shehacks Ke discuss how they are working to build cybersecurity strategies that suit the needs and capabilities of developing nations

Augmenting SMB Defense Strategies With MITRE ATT&CK: A Primer

Dark Reading

Any organization can use MITRE ATT&CK as a force multiplier, but it's especially valuable for small ones

IT 76

Building a Fortress: 3 Key Strategies for Optimized IT Security

Threatpost

Chris Hass, director of information security and research at Automox, discusses how to shore up cybersecurity defenses and what to prioritize. InfoSec Insider Malware Vulnerabilities Web Security

Best Practices for Accelerating the Sales Process

This eBook takes a look at three headache-free strategies you can employ today to accelerate selling the right way. Read on to learn how to adopt specific workflows and approaches that append your existing processes to deliver value to your prospects and internal counterparts.