IBM’s Cost of a Data Breach Report finds invisible ‘cyber tax’
| | | | | | | | | | | | | | | | | | | | |

IBM’s Cost of a Data Breach Report finds invisible ‘cyber tax’

When it comes to operational challenges, few mistakes are as costly as data breaches. Just one exploited vulnerability can lead to millions in damages, not just due to upfront disruption, but loss of respect from consumers, and potential compliance liabilities. Unfortunately, the cost of a data … See all articles in Insights

SEC’s Increased and Expanding Focus on Cybersecurity Disclosures | New York Law Journal
| | | | | | | | | | | | | | | | | | | |

SEC’s Increased and Expanding Focus on Cybersecurity Disclosures | New York Law Journal

Breaking news and trends with an emphasis on banking and financial litigation and regulations providing New York attorneys and legal pros the insight … See all articles in Insights

Ransomware preparation and response: Develop a cyber kill chain
| | | | | | | | | | | | | | | | | | | | |

Ransomware preparation and response: Develop a cyber kill chain

Emerging risks in the advent of hybrid/remote work, the proliferation of ransomware-as-a-service (RaaS) and talent shortages in every area of IT are testing the limitations of CISOs (chief information security officers) and CROs (chief risk officers) as never before. Having a frequently monitored … See all articles in Insights

Will Your Cyber-Insurance Premiums Protect You in Times of War?
| | | | | | | | | | | | | | | | | | | |

Will Your Cyber-Insurance Premiums Protect You in Times of War?

Multiple cyber-insurance carriers have adopted act-of-war exclusions due to global political instability and are seeking to stretch the definition of … See all articles in Insights

Password recovery tool infects industrial systems with Sality malware
| | | | | | | | | | | | | | | | | | | | |

Password recovery tool infects industrial systems with Sality malware

A threat actor is infecting industrial control systems (ICS) to create a botnet through password “cracking” software for programmable logic … See all articles in Insights

Cybersecurity Isn’t an IT Risk, It’s a Business Risk
| | | | | | | | | | | | | | | | | | | | | |

Cybersecurity Isn’t an IT Risk, It’s a Business Risk

Cybersecurity risk assessment should be an integral part of the organization’s enterprise risk management program and decision-making, not a siloed … See all articles in Insights

Hackers are targeting industrial systems with malware
| | | | | | | | | | | | | | | | | | | | |

Hackers are targeting industrial systems with malware

An entire ecosystem of sketchy software is targeting potentially critical infrastructure. From the what-could-possibly-go-wrong files comes this: An … See all articles in Insights

Conventional cybersecurity approaches are falling short – Help Net Security
| | | | | | | | | | | | | | | | | | | |

Conventional cybersecurity approaches are falling short – Help Net Security

Traditional security approaches that rely on reactive, detect-and-respond measures and tedious manual processes can’t keep pace with the volume, … See all articles in Insights

Technology transfer across the ages
| | | | | | | | | | | | | | | | | | |

Technology transfer across the ages

It is a truism to say that technology is all around us. Whether it’s the mobile phone you reach for before getting out of bed, the electricity … See all articles in Insights

Education institutions increasingly being hit with ransomware: Report
| | | | | | | | | | | | | | | | | | | |

Education institutions increasingly being hit with ransomware: Report

New Delhi, July 13 (IANS) Education institutions, both higher and lower education, are increasingly being hit with ransomware, with 60 per cent … See all articles in Insights