Article archive

Report: Boards Aren’t Getting the Cyber security Info They Need by Stephanie Forshee

04/03/2016 10:06
Chief information security officers (CISOs) need to start reporting more meaningful information to their boards, according to a new report from Bay Dynamics and Osterman Research, “Reporting to the Board: Where CISOs and the Board are Missing the Mark.”   The survey found that 61 percent of...

Quantifying Risk: Closing the Chasm Between Cybersecurity and Cyber Insurance

04/03/2016 08:16
Cyberattacks may be the biggest risk that global businesses are unprepared for.1 Record numbers of data breaches have driven large organizations to increase spending on security at twice the rate of other information technology during the past several years, according to market-growth studies by...

Verizon Report:Data breach digest. Scenarios from the field.

03/03/2016 10:02
The Verizon RISK Team performs cyber investigations for hundreds of commercial enterprises and government agencies annually across the globe. In 2015, we were retained to investigate more than 500 cybersecurity incidents occurring in over 40 countries. In 2008, the results of our field...

Snapchat Suffers Employee Data Breach after Phishing Attack

01/03/2016 07:35
A phising attack  on Friday tricked a payroll department staffer at Snapchat into revealing private information about some current and former employees, the video messaging service said yesterday in an online apology. No internal systems were breached and no information about users was...

New Report Shows How Separate Cyber Polices Can Fill Insurance Gap

28/02/2016 20:48
The coverage of cyber risks by conventional classes of insurance can be patchy, new research by the International Underwriting Association has revealed. A report issued to the association’s members details how some traditional lines of business might provide cover for the...

Study: Rush to connect to Internet of Things could open security gaps by Ally Marotti

23/02/2016 07:32
The rush by companies eager to incorporate the Internet of Things in their operations could introduce potential cybersecurity threats, according to a study released Monday. Eight-five percent of businesses are exploring or implementing connected devices, but only 10 percent of companies surveyed...

Pay Us the Money or the Website Gets It: Extortion by DDoS by Martin Mckeay

21/02/2016 16:43
Receiving an extortion letter instructing to “pay us in bitcoins or your site will suffer a distributed denial-of-service (DDoS) attack” has become almost commonplace in the last two years. They say there’s nothing new under the sun, and this applies to the Internet just as much as anything...

Hospital pays hackers $17,000 to unlock EHRs frozen in 'ransomware' attack by Joseph Conn

19/02/2016 08:26
A Southern California hospital's computers have been restored after it paid a $17,000 ransom in bitcoins to hackers who infiltrated and disabled its network. The gambit isn't new, but it appears to be on the rise.  "The quickest and most efficient way to restore our systems and administrative...

New Ponemon Institute Study “The Cyber Resilient Organization in Germany: Learning to Thrive Against Threats”

14/02/2016 21:59
With cyber attacks growing increasingly frequent and complex, cybersecurity strategies are shifting: while prevention is still important, it is more about prevailing. Cyber resilience supports businesses efforts to ensure they’ll continue to thrive despite the increased likelihood of a data...

Quick Guide To Cyber Insurance Shopping by Ericka Chickowski

13/02/2016 16:17
Experts offer their opinions on important due diligence tasks when procuring cyber insurance. With analysts projecting the cyber insurance market to heat up in the coming year, it's clear there are a lot of organizations on the hunt for a good policy. With cyber insurance still very much in its...
Items: 411 - 420 of 919
<< 40 | 41 | 42 | 43 | 44 >>