Category Archives: Cyber Risk

Too Big to Fall? Cyberattacks Claim Some Surprising Victims in September
Posted by

Too Big to Fall? Cyberattacks Claim Some Surprising Victims in September

First it was Equifax with over 140 million accounts compromised. Then it was the SEC whose EDGAR public-company filing system was breached. Then came Deloitte who revealed that hackers may have accessed the sensitive details of several blue-chip clients. Apparently, no one is immune to a cyberattack any longer—not even the regulatory watchdog that’s been […]

How IT Can Leverage AI to Prevent Major Cybersecurity Incidents
Posted by

How IT Can Leverage AI to Prevent Major Cybersecurity Incidents

The need for artificial intelligence (AI) in IT governance, risk and compliance (GRC) is growing quickly.  As companies expand their digital footprints, cybersecurity vulnerabilities worsen due to an increased amount of data being produced from IT security monitoring and performance tools. At its recent Ignite 2017 conference, Microsoft revealed its plans for further incorporating artificial […]

No, There Won’t Be New Rules On Cybersecurity – Until Someone Dies
Posted by

No, There Won’t Be New Rules On Cybersecurity – Until Someone Dies

Recently, I did an interview with Bloomberg Newsweek on the WannaCry ransomware attack that affected over 200,000 computers around the world.  The attack shutdown parts of the U.K. National Health Service leaving thousands of people without access to healthcare services, and resulted in Renault’s assembly lines being shut down in France among other things.  Newsweek […]

Mitigating Cyberattacks: The Prevention and Handling
Posted by

Mitigating Cyberattacks: The Prevention and Handling

Mitigating Cyberattacks New tools and technologies help companies in their drive to improve performance, cut costs and grow their businesses but as companies adopt cloud services in greater numbers and refine internal processes for development and operations, security considerations must be front and center. As companies rapidly adopt Cloud with a DevOps approach to rapid […]

Ransomware Cyber-Attacks: Best Practices and Preventive Measures
Posted by

Ransomware Cyber-Attacks: Best Practices and Preventive Measures

RANSOMWARE CYBER-ATTACKS “WanaCrypt0r 2.0” or “WannaCry,” an unprecedented global ransomware cyber-attack recently hit over 200,000 banking institutions, hospitals, government agencies, and other organizations across more than 150 countries. The ransomware encrypted user data, and demanded a payment in bitcoins to unlock the data. The companies that were hit included Telefonica – Spain’s largest telecom provider, […]

Principles of an Effective Cybersecurity Strategy
Posted by

Principles of an Effective Cybersecurity Strategy

Managing Cybersecurity Risks A number of trends contribute to today’s reality in which businesses can no longer treat cybersecurity as an afterthought. These include a rapid increase in the number of internet connected devices, an increased dependency on third party applications, self-provisioning as a result of bring-your-own-device and public cloud. Add to these, unprecedented levels […]

What Is Important? Cyber and Continuity Risk
Posted by

What Is Important? Cyber and Continuity Risk

New risks are emerging every day in the realm of Cybersecurity, and many organizations are moving quickly to address these risks: developing documentation, procedures, and processes. However, this is often without regard for Cybersecurity best practices. To ensure sustainability, organizations must develop cyber policies, plans, and procedures and put effective controls in place. If these […]