Join Us On LinkedIn

Cyber insurance is a new concept that can be a bit tricky to navigate when you’re looking to purchase your first policy. For example, you’ll likely have to define a cyber attack and assess the costs associated with things that might not have monetary value (such as damage to your company’s reputation). On top of […]
A new study, conducted by the Ponemon Institute on behalf of IBM, found that a vast majority of organizations surveyed are still unprepared to properly respond to cybersecurity incidents, with 77% of respondents indicating they do not have a cybersecurity incident response plan applied consistently across the enterprise. via Most Firms Still Unprepared To Respond […]
You would think that if a company was found both by the relevant regulatory authorities and by the courts to have taken all reasonable steps to protect personal data, it would have a complete answer to a data breach claim. Not so. That was the surprising (to some) outcome of a recent Court of Appeal […]
Cybersecurity articles are notoriously unpopular with financial advisers compared with other industry news, unless it’s something drastic like Voya’s recent slip-up exposing advisers’ Social Security numbers on its website. When it comes to financial technology, advisers are more likely to peruse something like T3’s 2019 Software Survey than they are to learn about how cybersecurity […]
In the past two years, 27 Illinois health care providers and companies have reported data breaches involving at least 500 patients. That includes a recent incident at Rush that may have exposed the information of 45,000 patients. Yet health care providers, in general, tend to spend less on data security than companies in other industries. […]
That’s why I was impressed to hear about the Israeli cybersecurity hotline that was officially launched this year, after an earlier pilot period. When people in Israel think they may be dealing with computer security threats or intrusions, they can just dial 119. Launched by Israel’s national Computer Emergency Response Team, the line is staffed […]
I have previously written about the role of the modern Chief Information Security Officer (CISO) and how CISOs align their security programs with the business operations of their companies. That article discussed the changing roles CISOs are now assuming as organizations mature and employ security leaders in positions that support strategic business goals. In retrospect, […]
Tech pundits began in 2015 asking whether small and large businesses needed the counsel of a law firm well-versed in cybersecurity. “Developing plans to protect digital information and networks while complying with state and federal regulations can be a legal challenge for any corporation,” mentions Kacy Zurkus in this August 2015 CSO article. “Is relying […]
Ars Technica reports that disgruntled customers have filed three federal lawsuits over the past month against Coinbase, likely the most popular platform for trading cryptocurrencies. Coinbase claims to host more than 10 million users and to have facilitated more than $50 billion worth of cryptocurrency trading. The suits filed against it include allegations of lax […]
Agatha Christie’s fictional sleuth Miss Marple once said in a BBC adaptation that “good advice is almost certain to be ignored, but that’s no reason for not giving it.” That may reflect how companies will respond to guidance recently issued by the Securities and Exchange Commission about how companies should deal with cybersecurity threats. via […]
Automatic Data Processing Inc. ADP +1.41% deployed a team of cybersecurity, risk management and financial-crime specialists to WorkMarket before acquiring it in January. The ADP team combed the software maker’s technology, practices and internal policies. It also interviewed staff about monitoring for intrusions, training employees and performing other security tasks. The payroll processor also hired […]
In truth, security is about methodology and analytics. It requires patience and discipline. It’s about applying repeatable business processes to detect and mitigate threats and forever training ourselves to keep our eyes on the ball and ignore the noise, no matter how loud or seemingly exciting that noise is. This is an unfortunate reality for […]
The NACD provides five helpful guiding principles for effective cyber-risk oversight that organizations can adopt and customize to their specific needs (e.g., size, life-cycle stage, strategy, business plans, industry sector, geographic footprint, etc.). via Cybersecurity: Five Guiding Principles for Boards – Lexology
Nine different cyber-security reports released the week of Feb.19 – 23 show a rising volume of cyber-threats, though not all organizations are preparing for the right types of attacks. via Cyber-Security Reports Reveal Growing Worries About Cyber-Risks
Securing the world against cyberattacks — from nations, criminal groups, vandals and teenagers — will be on the agenda when many of the world’s top leaders gather at the World Economic Forum in Davos, Switzerland, this week. As usual, there is a flurry of reports, and entrepreneurs will declare they have technological solutions at hand. […]