12 cyber security questions to ask your CISO – IT Governance UK Blog

12 cyber security questions to ask your CISO – IT Governance UK Blog

Cyber security affects companies of all sizes in all sectors. Moreover, threats are constantly evolving and your legal and regulatory requirements have become major issues – particularly with the introduction of the the GDPR (General Data Protection Regulation) and NIS Directive. All of this means that regular communication between management and the board regarding cyber security is more important than ever. It’s only by discussing these issues regularly and in a formal environment that you can…

Read More

The state of loss prevention and asset protection

The state of loss prevention and asset protection

The state of loss prevention and asset protection | 2021-05-13 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Learnings from the Colonial Pipeline cyberattack: focus on the 98% of attacks, not the 2%!

Learnings from the Colonial Pipeline cyberattack: focus on the 98% of attacks, not the 2%!

Learnings from the Colonial Pipeline cyberattack: focus on the 98% of attacks, not the 2%! | 2021-05-13 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy…

Read More

Cybercriminals exploit these cognitive biases the most

Cybercriminals exploit these cognitive biases the most

Cybercriminals exploit these cognitive biases the most | 2021-05-13 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Survey: Only 39% of Orgs Have Ability to Retain Cyber Security Talent

Survey: Only 39% of Orgs Have Ability to Retain Cyber Security Talent

The cyber security skills gap was a problem prior to the pandemic. In a survey of 342 security professionals released in early 2020, Tripwire found that 83% of security experts felt more overworked going into the new year compared to how they felt at the start of 2019. Tripwire asked respondents to elaborate on that sentiment. In response, almost the same proportion (82%) of survey participants said their teams were understaffed, with 85% revealing that…

Read More

NIST SP 1800-27: Securing Property Management Systems (PMS)

NIST SP 1800-27: Securing Property Management Systems (PMS)

In 2019, the hospitality industry suffered 13 percent of all data breaches, ranking third highest among targeted industries. It was two years later when NIST released SP 1800-27: Securing Property Management Systems to help hoteliers secure their Property Management Systems (PMS) and associated patron data. The National Cybersecurity Center of Excellence (NCCoE) at NIST collaborated with cybersecurity solutions providers and the hospitality business community to create a zero-trust example implementation framework under which a PMS…

Read More

Secure Data Recovery Services: Protecting Business Continuity

Secure Data Recovery Services: Protecting Business Continuity

By Dmitriy Kardashev, Founder and CEO, SecureData, Inc. In today’s world, consumers and businesses alike require consistent and easy access to their data. Whether it’s large customer databases that an organization relies on for daily operations, highly confidential and sensitive information that flows through government, healthcare or manufacturing sectors, or irreplaceable photos and videos stored on mobile devices, any disruption of access could be catastrophic. A comprehensive data recovery plan should be as integral a…

Read More

City of Tulsa, is the last US city hit by ransomware attack

City of Tulsa, is the last US city hit by ransomware attack

The city of Tulsa, Oklahoma, has been hit by a ransomware attack over the weekend that impacted its government’s network and shut down its websites. One of the biggest cities in the US  by population size, the City of Tulsa, was victim of a ransomware attack that affected its government’s network and forced the shutdown of official websites over the weekend. Shortly after the attack, that took place Friday night, the city issued a statement…

Read More

Anomali Cyber Watch: Cozy Bear TTPs, Darkside Ransomware Shuts Down US Pipeline, Operation TunnelSnake Uses New Moriya Rootkit, and More

Anomali Cyber Watch: Cozy Bear TTPs, Darkside Ransomware Shuts Down US Pipeline, Operation TunnelSnake Uses New Moriya Rootkit, and More

The various threat intelligence stories in this iteration of the Anomali Cyber Watch discuss the following topics: APT, Fileless Malware, Malspam, Phishing, Ransomware, Rootkits, Targeted Attacks and Vulnerabilities. The IOCs related to these stories are attached to Anomali Cyber Watch and can be used to check your logs for potential malicious activity. Figure 1 – IOC Summary Charts. These charts summarize the IOCs attached to this agazine and provide a glimpse of the threats discussed….

Read More

Episode 3: You’ve Passed CIAM 101 – Now It’s Time to Automate

Episode 3: You’ve Passed CIAM 101 – Now It’s Time to Automate

You’ve learned the basics of customer identity and access management (CIAM). And you’ve listened as experts from Okta explained the CIAM Maturity Curve, which helps organizations determine where they fall on the spectrum. In this third episode of our 5-episode podcast, The C-level Strategic Guide for CIAM Investment, we will explore phase 2 on the CIAM Maturity Curve: Automated. Companies at phase 2 can face a range of new challenges, says Keith Casey, API Problem…

Read More
1 2,387 2,388 2,389 2,390 2,391 2,686