The power of partnership in mitigating cyber risk: A CFO’s perspective

The power of partnership in mitigating cyber risk: A CFO’s perspective

Business leaders are charged with creating economic value. Escalating cybercrimes, however, pose critical threats to growth. Indeed, bad actors are increasingly creative and sophisticated with their craft. Viruses, worms, trojans, spyware, bricking, other malware, whaling, other forms of phishing, crypto-jacking, man-in-the-middle attacks, zero-day exploits or a good old fashioned brute force attack are just a few ways these bad actors can impinge on our ability to effectively run a business. And for unsuspecting companies, especially…

Read More

Empowering remote healthcare workers: A collaborative approach

Empowering remote healthcare workers: A collaborative approach

Healthcare organizations are increasingly adopting remote work as a permanent strategy. In this new era, robust cybersecurity is critical. This article delves into strategies healthcare organizations can implement to empower their remote workforce and protect sensitive patient and corporate data. Understanding shared security responsibility With remote employees now relying on IT resources beyond the control of healthcare organizations, the concept of shared security responsibility becomes paramount. It’s not just about organizations securing as much of…

Read More

A CISO's perspective on the modern cybersecurity landscape

A CISO's perspective on the modern cybersecurity landscape

Many businesses still believe there is such a thing as 100% security, despite every cybersecurity expert affirming the opposite. Because companies push for and demand 100% security, the organization ultimately settles for a false sense of it so their people can function. Such a mindset is not only wrong but incredibly dangerous. Business leaders must recognize that breaches are imminent, and a robust approach to cybersecurity involves detecting and responding quickly and effectively to incidents….

Read More

Nearly 90% of businesses saw up to 9% of revenue lost due to fraud

Nearly 90% of businesses saw up to 9% of revenue lost due to fraud

A new survey by Veriff has shown that fraud attempts have increased this year, contributing to financial repercussions. Almost 90% of respondents report that their organization saw as much at 9% of revenue lost as a result of fraud. This suggests that companies making $100 million per year could potentially lose $9 million annually from fraud.  Key findings from the survey include:  Nearly 87% report a rise in online fraud as of April 2024. Only 1.19%…

Read More

Beyond the breach: The ongoing fragility of healthcare cybersecurity

Beyond the breach: The ongoing fragility of healthcare cybersecurity

A wave of ransomware attacks in the United States and United Kingdom that have disrupted clinical operations and forced hospitals in both regions to turn away patients is the latest reminder of the fragility of life-saving infrastructure and how lucrative it can be for attackers looking for a payday or an opportunity to sow discord into the lives of patients.  In May, St. Louis-based Ascension Healthcare, one of the largest private healthcare systems in the…

Read More

Cybercriminals target SAP vulnerabilities

Cybercriminals target SAP vulnerabilities

Cybercriminals are getting better at attacking critical business applications, according to a recent report by Onapsis. The report found a rise in threat actors targeting SAP vulnerabilities.  According to the report, 2023 was an important year for the SAP application threat landscape. The report found a 400% increase in ransomware incidents that involved compromising SAP systems and data at victim’s organizations.  The report found that conversations on SAP vulnerabilities and exploits have increased 490% across…

Read More

With the exponential growth of data, new SEC rules need a new approach

With the exponential growth of data, new SEC rules need a new approach

The latest estimates show 328.77 million terabytes of data are created each day, roughly 120 zettabytes per year, compared to just 2 zettabytes in all of 2010. This growth isn’t expected to slow in the coming years, and organizations increasingly rely on this data to make informed business decisions, conduct research and analysis and much more. But managing and securing that growth in data volume poses a challenge for security teams, leading to more breaches…

Read More

An intelligent application future hinges on using responsible AI

An intelligent application future hinges on using responsible AI

As enthusiasm for AI builds and regulation gains momentum, investing in “doing generative AI” responsibly and ethically is not just the right thing to do — it will give companies a competitive advantage. Responsible AI helps mitigate operational, financial and competitive risks. Plus, data shows that companies leveraging responsible AI practices may be better positioned to attract and retain talent.  Unfortunately, there’s no industry standard for what responsible AI should look like. Stanford researchers found…

Read More

90% of organizations experienced an identity incident this past year

90% of organizations experienced an identity incident this past year

A report by the Identity Defined Security Alliance (IDSA) examined the identity security systems within large organizations. The study revealed trends in common identity incident vectors and direct organizational influence. It also analyzed the impact of trends such as cyber insurance, artificial intelligence (AI) and the shifting regulatory landscape. Among the studied organizations, 90% claimed to experience an identity-related event in the last year. This percentage remains consistent with the percentage from 2023.  More key…

Read More

Financial consequences of ignoring security debt in 2024

Financial consequences of ignoring security debt in 2024

For years, large organizations have leaned on the assurances provided by their software suppliers’ certifications such as SOC 2 and ISO27001, assuming certifications meant that vendors’ security measures were up to par. However, due to a recent shift in hackers focus the spotlight is now turned towards the software supply chain. If it wasn’t crystal clear, then it is now: vendors’ vulnerabilities aren’t just theirs — they’re yours too. What might have once seemed like…

Read More
1 2 3 4 5