Tag "Cyber Risk"

Back to homepage
IT Compliance

Executives are not Actively Engaged in Ensuring the Effectiveness of Cybersecurity Strategy

There’s a clear lack of accountability, especially on the board and among C-suite executives, and a lack of confidence in determining the efficacy of security technologies. Click here to view

Hardware/Network

New Data Analysis Approach could Strengthen the Security of IoT Devices

A multi-pronged data analysis approach that can strengthen the security of IoT devices, such as smart TVs, home video cameras and baby monitors, against current risks and threats has been created

Industry Insights

70% of Presidential Campaigns Fail to Provide Adequate Online Privacy & Security Protections

An alarming 70% of the campaign websites reviewed in the OTA 2020 U.S. Presidential Campaign Audit failed to meet OTA’s privacy and security standards – potentially exposing visitors to unnecessary risks. Click

Hardware/Network

Consumers Concerned About Connected Home Privacy, Still Few Implement Safety Practices

In order to understand what people are doing to protect themselves from the risk of compromised smart home devices, such as internet-connected TVs, smart thermostats, home assistants and more, ESET polled 4,000 consumers.

Industry Insights

Your Employees are Taking Your Data

When it comes to insider threats to data security, too many organizations are in denial. Not all employees will take company data, but chances are high that if you don’t

Industry Insights

Winning the security fight: Tips for organizations and CISOs

For large organizations looking to build a robust cybersecurity strategy, failure to get the fundamentals in place practically guarantees a disaster. If you ask Matthew Rosenquist, a former Cybersecurity Strategist for

Hardware/Network

Homeland Security, DoD, Transportation Officials Focus on Aviation Cyber Security

The Department of Homeland Security (DHS), the Pentagon, and the Department of Transportation (DOT) have been working since May to implement the cyber security goals of the National Strategy for Aviation

Industry Insights

Signal From Noise: How to Win Customers and Influence CISOs

One of the most overused phrases in cybersecurity discourse is “the ever-changing landscape”. While it is true that security threats evolve alarmingly quickly, this doesn’t mean that the needs of

Uncategorized

Email is an open door for malicious actors looking to exploit businesses

There’s an alarming scale of risks businesses are up against in a time when email is proving an open door for cybercriminals and malicious actors looking to disrupt, exploit and destroy businesses,

Industry Insights

Assessing risk: Measuring the health of your infosec environment

There is an uncomfortable truth that many organizations are not conducting comprehensive assessments of their information security risk; or those that do aren’t getting much value out of assessment exercises