article thumbnail

6 Ways to Create an Incident Response Plan That’s Actually Effective

CyberSecurity Insiders

Someone in IT places a phone call and gets asked whether the company has cyber insurance. Your IR plan should contain the contact information for everyone who might be needed, from your service providers to key employees to outside counsel to, yes, the insurance provider. Include contact information.

Insurance 139
article thumbnail

Cyber Defense Magazine: Exclusive Interview with Robert Herjavec

Herjavec Group

In 2003, he knew that firewalls were too complex for all IT staff and for understaffed companies to manage. Within this whirlwind of all things moving to the internet, insurance vendors recently began to take cyber insurance very seriously. He and his tiny team of 3 people, began the world’s first MSSP.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Compliance & Data Privacy Regulations

eSecurity Planet

See the Top Governance, Risk and Compliance (GRC) Tools. The Fair and Accurate Credit Transactions Act of 2003 (FACTA), for instance, so broadly defines what a “creditor” is that businesses that have no need for collecting various bits of PII (personally identifiable information) are compelled to collect and keep it.

article thumbnail

Aruba ClearPass Policy Manager NAC Solution Review

eSecurity Planet

The company was founded in 2003 and is a wholly owned subsidiary of HPE. A pioneer in wireless networking, Aruba now offers infrastructure services as software from the public or private cloud to enable secure connectivity for a wide range of devices including mobile and IoT.

Wireless 108
article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Vicarius Vulnerability management 2022 Private Dragos ICS and OT security 2021 Private Safeguard Cyber Risk management 2021 Private CyberGRX Risk management 2019 Private Signifyd Fraud protection 2018 Private RedOwl Security analytics 2015 Acquired: Forcepoint. AllegisCyber Investments.

article thumbnail

Highlights from the New U.S. Cybersecurity Strategy

Krebs on Security

. “Any such legislation should prevent manufacturers and software publishers with market power from fully disclaiming liability by contract, and establish higher standards of care for software in specific high-risk scenarios,” the strategy explains. When the Bush administration released the first U.S.