As Cybersecurity Awareness Month kicks off this week, U.S. President Joe Biden has weighed in on his administration's efforts to curb cyberattacks and bolster the federal government's security posture.
Of all the areas under his direction - business continuity, GRC, data governance - third-party risk is the most challenging, says Peter Gregory, senior director of cyber GRC at GCI General Communications Inc. "Their breach is my breach," he says, offering mitigation advice.
If the process of building a cohesive security plan seems daunting, or there just isn’t enough time, expertise or resources to complete the project yourself, help is here for building, maintaining and continuously evolving your cybersecurity program to meet current and future challenges.
Download this whitepaper...
Roger Lang, who has experience in SaaS and fintech and has invested in various cybersecurity companies, says that education is the key to making real progress on cybersecurity issues.
The day-to-day pressures of being a CISO are enormous and extend to matters far beyond those of incident response time. Meanwhile, traditional approaches to training cybersecurity team members have either been limited by scalability, lack of hands-on learning, or cost.
So, how much can Simulation-based Cybersecurity...
In theory, organizations are best protected by a layered security approach to cybersecurity based on best-in-class security tools.
In reality, the desired outcome is rarely achieved.
Why? Because most teams are not fully trained to use the technology on which their security program is built.
Download this...
Small businesses have been disproportionately affected by hackers in recent months. To aid in countering the threat, Mastercard has launched a cybersecurity education effort targeting this market segment. Paul Trueman, a senior vice president Mastercard, explains the “Trust Center” initiative.
What really makes a "strong" password? And why are your end-users tortured with them in the first place? How do hackers crack your passwords with ease? And what can/should you do about your authentication methods?
For decades, end-users have borne the brunt of the password tyranny, a result of the IT industries'...
Motivation, retention, and support are the crucial components of every successful security awareness training program. After you’ve got your program in place and it’s optimized to motivate adult learners, you can start to focus on improving the ‘stickiness’ of your program by focusing on improving your...
The best way to change user behavior and create a culture of enhanced security awareness is through a comprehensive security program that leverages a wide variety of tools and techniques. During this webinar we'll explore how organizations can develop a fit-for-purpose cyber awareness strategy that engages employees,...
You know that "security awareness" is key to a comprehensive security strategy. But just because someone is aware doesn't mean they care. So how can you design programs that work with, rather than against, human nature? Here's the great news. Creating a security awareness strategy that not only educates, but...
Want to improve how your organization
delivers and absorbs security awareness
training? Then it comes down to
reinventing your approach, including
gamification.
Download this eBook to learn more about:
What's wrong with traditional training methods;
Lessons learned from Barracuda's customers;
How to measure...
Want to improve how your organization delivers and absorbs security awareness training? Then it comes down to reinventing your approach, including gamification, says Barracuda's Michael Flouton.
Organizations across all sectors are experiencing the cybersecurity skills gap however, it's not just a skill deficit - it's a capacity gap that is widening, driven mainly by the fact that our networks are becoming more complex.They're more distributed, mobile- and cloud-enabled; therefore, it's becoming more of a...
One of the most-heard complaints from security experts is that often they find their work repetitive ("The CFO's laptop has been compromised... again!"), which results in the desire of trying something "new", meaning "leave for another company." Another common complaint is that the work is very compartmentalized, and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ransomware.databreachtoday.com, you agree to our use of cookies.