Why email is still the number one threat vector
| | | | | | | | | | | | | | | | | | | | |

Why email is still the number one threat vector

Companies across the world spend billions on cybersecurity, protecting their corporate networks from intrusion, hacking, malware, back-door … See all articles in Insights

SBOMs: What they are and why organizations need them
| | | | | | | | | | | | | | | | | | | | |

SBOMs: What they are and why organizations need them

In the continuously rippling wake of cyberattacks, hacks and ransomware, organizations want — and need — to clean up their software supply chains. In this, they are increasingly turning to a valuable visibility tool: the software bill of materials (SBOM). As noted by the Cybersecurity and … See all articles in Insights

Cyber insurance is on the rise, and organizational security postures must follow suit
| | | | | | | | | | | | | | | | | | | | |

Cyber insurance is on the rise, and organizational security postures must follow suit

Despite best efforts to the contrary — ransomware, hacks and data breaches are more prevalent than ever. Close to 75% of global cyber-risk decision makers report that their company experienced at least one cyberattack in the past year — and just 3% of respondents rated their company’s cyber hygiene … See all articles in Insights

‘SIM Swapping’ Hackers Steal Thousands of Dollars From Victims’ Bank Accounts
| | | | | | | | | | | | | | | | | | | |

‘SIM Swapping’ Hackers Steal Thousands of Dollars From Victims’ Bank Accounts

Online hackers have created a new scam called “SIM swapping.” First, they steal someone’s personal information and then contact the victim’s mobile … See all articles in Insights

24 Things to Know About Cyber Insurance
| | | | | | | | | | | | | | | | | | | | |

24 Things to Know About Cyber Insurance

July 28, 2022 Cyber insurance covers losses incurred as a result of cyberattacks. Here’s what you need to know about it as customers demand more … See all articles in Insights

Security Think Tank: Don’t rely on insurance alone
| | | | | | | | | | | | | | | | | | | | |

Security Think Tank: Don’t rely on insurance alone

It’s news to no one that cyber attacks have increased in frequency, maturity and impact over the past few years and the threat landscape has grown … See all articles in Insights

NIST Releases Draft Cybersecurity Resource Guide on Implementing the HIPAA Security Rule
| | | | | | | | | | | | | | | | | | | | |

NIST Releases Draft Cybersecurity Resource Guide on Implementing the HIPAA Security Rule

Jennifer J. HennessyJurisdiction: All FederalType of Law: Communications, Media & InternetHealth Law & Managed CareAdministrative & Regulatory See all articles in Insights

CISOs: Embrace a common business language to report on cybersecurity
| | | | | | | | | | | | | | | | | | | |

CISOs: Embrace a common business language to report on cybersecurity

The U.S. Securities and Exchange Commission (SEC) recently issued updated proposed rules regarding cybersecurity risk management, program management, strategy, governance and incident disclosure for public companies subject to the reporting requirements of the Securities Exchange Act of 1934. As a … See all articles in Insights

IBM’s Cost of a Data Breach Report finds invisible ‘cyber tax’
| | | | | | | | | | | | | | | | | | | | |

IBM’s Cost of a Data Breach Report finds invisible ‘cyber tax’

When it comes to operational challenges, few mistakes are as costly as data breaches. Just one exploited vulnerability can lead to millions in damages, not just due to upfront disruption, but loss of respect from consumers, and potential compliance liabilities. Unfortunately, the cost of a data … See all articles in Insights

Ransomware preparation and response: Develop a cyber kill chain
| | | | | | | | | | | | | | | | | | | | |

Ransomware preparation and response: Develop a cyber kill chain

Emerging risks in the advent of hybrid/remote work, the proliferation of ransomware-as-a-service (RaaS) and talent shortages in every area of IT are testing the limitations of CISOs (chief information security officers) and CROs (chief risk officers) as never before. Having a frequently monitored … See all articles in Insights