In the U.S., three states now have disparate data privacy laws - and more are coming. Meanwhile, China has enacted a new law that has global enterprises scrambling. How will these and other actions shape privacy discussions in 2022? Noted attorney Lisa Sotto shares insights.
Lisa Sotto, partner and chair of the global privacy and cybersecurity practice at Hunton Andrews Kurth LLP, joins three ISMG editors to discuss important cybersecurity and privacy issues, including how U.S. enterprises are harmonizing three disparate privacy laws, and ransomware preparedness.
With automotive standard ISO 21434 just around the corner, this tutorial focuses on how it will form a key protective component against the cyber threats facing automation software developers.
If you're not "on board" with the Functional Safety Standard EN 50128:2011 - “Railway
applications - Communication, signaling and processing systems - Software for
railway control and protection systems" - you'll need to run to catch up.
Currently the systems included under EN 50128 include
signaling, railway...
The Center for Internet Security (CIS) emphasizes continuous vulnerability management in its top 10 security controls. Given the complexity of the current digital landscape, many organizations face greater cyber-risk today. Adding to this woe is the rate at which vulnerabilities are burgeoning. The coverage of attack...
Election security improvements, the push for all software to ship with a "bill of materials" and the results of a long-running investigation into a lucrative digital advertising scam are among the latest cybersecurity topics to be featured for analysis by a panel of Information Security Media Group editors.
Security has become everyone’s job, and its management has become a strategic concern of the enterprise. The way forward is for the enterprise to build a culture of security. AWS Enterprise Strategist Mark Schwartz describes approaches he's used to establish awareness of risks and controls along with a set of norms...
During the pandemic, two unusual and apparently unrelated trends have emerged - the rapid growth of the MSS (Managed Security Services) market and an increased demand for complex compliance management.
Read the latest CyberTheory Market report, Convergence of Compliance and MSSP/MDR results in a New Service...
Despite the soaring list of customers reporting data breaches tied to the May ransomware attack on Blackbaud - and numerous legal actions filed against the company - the fundraising software vendor recently told Wall Street that it expects cyber insurance to cover the bulk of its costs associated with the incident.
Reducing misconfigurations, monitoring malicious activity, and preventing unauthorized access are foundational activities necessary to ensure security and compliance of applications and data in the cloud. As criminals become more sophisticated in their abilities to exploit cloud misconfiguration vulnerabilities,...
At the start of 2020, the legal and compliance communities were focused on the enactment of CCPA and other global privacy initiatives. A worldwide pandemic later, and the focus is on business resiliency, insider risk and visibility into a new army of endpoint devices. Many enterprises accepted new risk to deploy their...
At the start of 2020, the legal and compliance communities were focused on the enactment of CCPA and other global privacy initiatives. A worldwide pandemic later, and the focus is on strategizing for the "new normal", the evolving threat of ransomware (and how that impacts cyber insurance) and the changing privacy...
From cutting costs to reducing risks and problems, there are many benefits to automating GRC.
But, what are the simplest ways to maximize value and minimize costs during implementation?
Check out the 8 simple steps for automating GRC and learn how to create a GRC roadmap that:
Scales with your...
The financial and legal penalties that could result from noncompliance make it imperative to invest in transforming outdated GRC processes.
Through continuous monitoring and automation you can improve decision making, increase performance across your organization, and respond to business risks in real-time.
Read...
The cybersecurity outlook for 2020 and the new decade will be characterized by more advanced, targeted and coordinated attack vectors designed to exploit the cybersecurity skills shortage, along with congenitally poor security fundamentals and hygiene.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ransomware.databreachtoday.com, you agree to our use of cookies.