Cyber insurance getting harder to obtain
| | | | | | | | | | | | | | | | | | | |

Cyber insurance getting harder to obtain

The number of organisations that will either be unable to afford cyber insurance, end up with insufficient coverage, or be refused a policy … See all articles in Insights

CISOs: Embrace a common business language to report on cybersecurity
| | | | | | | | | | | | | | | | | | | |

CISOs: Embrace a common business language to report on cybersecurity

The U.S. Securities and Exchange Commission (SEC) recently issued updated proposed rules regarding cybersecurity risk management, program management, strategy, governance and incident disclosure for public companies subject to the reporting requirements of the Securities Exchange Act of 1934. As a … See all articles in Insights

Cybersecurity Isn’t an IT Risk, It’s a Business Risk
| | | | | | | | | | | | | | | | | | | | | |

Cybersecurity Isn’t an IT Risk, It’s a Business Risk

Cybersecurity risk assessment should be an integral part of the organization’s enterprise risk management program and decision-making, not a siloed … See all articles in Insights

Conventional cybersecurity approaches are falling short – Help Net Security
| | | | | | | | | | | | | | | | | | | |

Conventional cybersecurity approaches are falling short – Help Net Security

Traditional security approaches that rely on reactive, detect-and-respond measures and tedious manual processes can’t keep pace with the volume, … See all articles in Insights

Cyber Insurers Looking for New Risk Assessment Models
| | | | | | | | | | | | | | | | | | | |

Cyber Insurers Looking for New Risk Assessment Models

Cyber insurance companies are looking for new ways to assess risk as they grow increasingly wary of rising claims, said a report from cybersecurity … See all articles in Insights

Shifting the Cybersecurity Paradigm From Severity-Focused to Risk-Centric
| | | | | | | | | | | | | | | | | | | | |

Shifting the Cybersecurity Paradigm From Severity-Focused to Risk-Centric

Embrace cyber-risk modeling and ask security teams to pinpoint the risks that matter and prioritize remediation efforts. See all articles in Insights

How to stop ransomware? It starts with an enterprise risk management program
| | | | | | | | | | | | | | | | | | | | | |

How to stop ransomware? It starts with an enterprise risk management program

“It’s not about ultimate security. It’s about doing what’s right for the organization, and it should be business-driven,” said one expert at the … See all articles in Insights

Mitigating third-party risks with effective cyber risk management – Help Net Security
| | | | | | | | | |

Mitigating third-party risks with effective cyber risk management – Help Net Security

Third-party engagement has steadily become an essential part of business operations for many organizations, enlisted for all kinds of products and services across nearly all sectors, regardless of size, geographical location or type of industry. But because systems are so interconnected and third parties often hold sensitive information or have access to a partner’s systems,…