Remove how-attackers-infiltrate-the-supply-chain-what-to-do-about-it
article thumbnail

RSAC insights: CyberGRX finds a ton of value in wider sharing of third-party risk assessments

The Last Watchdog

It’s much easier to blunt the attack of an enemy you can clearly see coming at you. Related: Supply chains under siege. But what about trusted allies who unwittingly put your company in harm’s way? So could sharing intelligence about third-party suppliers help? This took the form of programmatic audits.

Risk 195
article thumbnail

Here’s Why SMBs Need Improved Cybersecurity Now More Than Ever

Vipre

We’ve all heard about big companies getting hit by data breaches — Yahoo , Facebook , Marriott International , and more have notoriously fallen victim to large-scale attacks that rocked news headlines. But what about small-to-medium-sized businesses (SMBs)? Wondering why a threat actor would even go after an SMB?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Four ways to shut down cyberattacks following mergers and acquisitions

SC Magazine

During the original purchase of Yahoo by Verizon in 2017, when Yahoo disclosed two large-scale data breaches, Verizon lowered its initial offer by $350 million to offset some of the security risks they would have to take on. Every company can play a role in reducing (or increasing) cybersecurity risk during a merger or acquisition.

Risk 53
article thumbnail

Cybersecurity Risk Assessment: Why You Need It and How to Perform It Right

Spinone

IBM’s “ 2019 Cost of a Data Breach Report ” details the costs that come from a data breach as a result of various cybersecurity risks. However, your organization can prepare for various types of cybersecurity threats and attacks so as to limit their cause. What is a cybersecurity risk assessment?

Risk 52
article thumbnail

7 Trends I Spotted When Reviewing 2020 and the Cybersecurity Skills Gap

Jane Frankland

When it comes to the skills gap and women in cybersecurity, I’m regularly approached by journalists who ask me what the root problem is, what more we can do, who’s doing a good job, and whether this year’s pandemic has actually made things better or worse. Business owners want to understand how to protect their assets.