Cyber Security Industry News
How to conduct a cyber-resilience assessment
It's a good cyber hygiene practice to periodically review your organization's cybersecurity plans and procedures. Use this checklist to guide your cyber-resilience assessment. Periodic assessments of cybersecurity plans, policies and procedures ensure cybersecurity programs are [...]
SEC Proposes New Cybersecurity Rules for Public Companies
Keeping up with federal regulations is an inevitable part of cybersecurity. While new rules aim to protect business, they also require more work. The U.S. Securities and Exchange Commission (SEC) recently proposed new rules that [...]
Shifting the Cybersecurity Paradigm From Severity-Focused to Risk-Centric
Embrace cyber-risk modeling and ask security teams to pinpoint the risks that matter and prioritize remediation efforts. New cybersecurity vulnerabilities increased at a never-before-seen pace in 2021, with the number of vulnerabilities reaching the highest [...]
The cybersecurity breach: who is to blame?
(Image credit: Shutterstock) Earlier this year, the Government launched its new National Cyber Strategy in an effort to strengthen digital resilience across the UK. As part of this strategy, the Cabinet Office declared that it [...]
How to Protect Your Remote Workforce from a Cyberattack
Earlier this year, an industry report stated that 79% of businesses remain concerned about the security risks of an increasingly remote workforce. Cyberattacks are on the rise since the COVID-19 pandemic, in part because many [...]
3 Cybersecurity Tips You Should Know
As we begin to migrate our lives to the internet, cybersecurity is now everyone's business. Whenever you search, socially network, and shop online, you automatically share your information with many databases worldwide, with each having [...]
What Is User and Entity Behavior Analytics (UEBA)?
Cybersecurity is becoming increasingly important to businesses of all sizes. It's now common for even small companies to use a wealth of tools such as SIEMs, firewalls, and VPNs to protect against intrusion.Hackers, however, are [...]
Cybersecurity Agencies Release Guidance for PowerShell Security
PowerShell is one of the most common tools used by hackers in “living off the land” attacks, when malicious actors use an organization’s own tools against itself.This week, U.S. cybersecurity agencies joined their counterparts in [...]
American Property Casualty Insurance Association Offers Cybersecurity and Data Security Best Practices for Businesses
CHICAGO, Illinois, June 22 (TNSres) -- The American Property Casualty Insurance Association issued the following news release:With ransomware attacks increasing in both frequency and severity, APCIA and its Cyber Insurance Subcommittee have developed a paper [...]
#HowTo: Demystify the NIST Cybersecurity Framework
The NIST Cybersecurity Framework’s comprehensiveness makes it the de facto standard across industries. However, the Framework has one major weakness: its guidelines can be particularly confusing for newcomers to understand.The Framework is organized into five [...]
How Your Organization Can Benefit from the NIST Cybersecurity Framework
The primary goal of the NIST cybersecurity framework is to reduce cybersecurity risk to an acceptable level.Everyone loves a good life hack, right? I’ve found that one such hack for those in cybersecurity is the [...]
How Can Cybersecurity Be Amended for Today’s Remote Workforce?
Source: unsplash.com The 5th industrial revolution is upon us. With a range of technological advances in the past decade, office spaces have transitioned to a great extent. Moreover, numerous facets of the tech industry have [...]
Reexamining the “5 Laws of Cybersecurity”
Nearly a year ago, journalist Martin Banks codified “ Five Laws of Cybersecurity ”. Cybersecurity is a complicated field, and any way to simplify its many facets into short, easy-to-remember maxims is always welcome. The [...]
Survey: Maintaining Cybersecurity Balance is a Challenge
Home » Security Boulevard (Original) » Survey: Maintaining Cybersecurity Balance is a Challenge A survey of 1,007 IT decision-makers at small-to-medium enterprises (SMEs) found two-thirds of respondents (66%) conceded that adding security measures resulted in [...]
Five Things Employees Do That Put Your Organization at Risk
Technology Whether it’s using unsanctioned tools or putting off upgrades 100 times too many, association pros could be introducing security problems for their organization with bad computing practices. Your employees probably aren’t trying to put [...]
Cybersecurity Professionals Identify Top Cloud Computing Security Risks
By Jill McKeon Some of the most traditional cloud security concerns, such as denial-of-service, CSP data loss, and shared technology vulnerabilities, were rated significantly lower than in years past.“New, highly rated items in the survey [...]