by Glenn A. Stout, Ph.D., CISM, GSEC, PMP, Managing Consultant, Governance & Compliance Services A friendly cybersecurity reminder when many are traveling to schools or just to get away. As families prepare to take to the beaches, resorts and other vacation spots all over the world, bad actors area also preparing their various cyber attacks on the unsuspecting.
We all know it has been one heck of a year, one full of challenges at many levels. While we all contend with different types of threats across a variety of fronts, one threat that cannot be ignored is the tsunami of cyberattacks that have accelerated during the era of COVID.
The year 2020 will be known for a great many things. One of them is innovation.
We forecast cybersecurity threats and events not to predict the future, but to change it. Regulators and litigators all hold us accountable for knowing foreseeable threats so we can avoid them. But what is foreseeable?
Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Focal Law Group, discusses DoCRA – Duty of Care Risk Analysis.
Cyber-attacks happen. And they are happening more frequently and leaving more damage in their wake. What can you do to minimize that impact?
2020 has been quite a year so far, surfacing security vulnerabilities many were unprepared for. Cyber attackers took advantage of new remote working environments as well as our fear and uncertainty due to COVID-19, and hit our networks hard.
NetDiligence Cyber Risk Summit: What is Reasonable Cyber Security? The panel provided an overview of the risk-based analysis process that substantiates the method, and presented the legal, regulatory, and security best-practice history that informs the method. Each participant presented why the method successfully substantiates the term “reasonable” in their work and provided anecdotes that illustrate […]
HALOCK partnered with a Manufacturing company to recover data exfiltrated from a ransomware attack
Hackers are relentless adversaries who incessantly create new tools and methodologies to take advantage of known exploitable vulnerabilities within networks.