article thumbnail

Protecting your Customers and Brand in 2022: Are you doing enough?

Jane Frankland

These are leaders who understand how to implement progressive technologies, like the cloud, 5G, artificial intelligence, machine learning, and others that are intricately woven, interconnected, and interdependent. Cyber risks top worldwide business concerns in 2022. billion) is expected online.

CISO 130
article thumbnail

Best Third-Party Risk Management (TPRM) Tools of 2021

eSecurity Planet

Best Third-Party Risk Management (TPRM) Tools. Launched in 2000 to address the growing need for enterprise supplier management, Aravo Solutions now offers SaaS-based supplier information management (SIM) technology. Additional features include intake of new vendors, automating risk assessments , and conducting due diligence.

Risk 129
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Last Watchdog’s IoT and ‘zero trust’ coverage win MVP awards from Information Management Today

The Last Watchdog

I’ve been paying close attention to privacy and cybersecurity since 2004, first as a technology reporter at USA TODAY, then as Editor-In-Chief of ThirdCertainty.com, a corporate-underwritten news analysis blog. I’ve never done stories to win awards. That usually happens every time I publish a story under my byline.

IoT 33
article thumbnail

Episode 162: Have We missed Electric Grid Cyber Attacks for Years? Also: Breaking Bad Security Habits

The Security Ledger

. » Related Stories Spotlight Podcast: Security Automation is (and isn’t) the Future of Infosec Episode 159: Deep Fakes and Election (in)Security with ZeroFOX Spotlight Podcast: Rethinking Your Third Party Cyber Risk Strategy. grid happened in March of this year. Joe Weiss, Applied Control Solutions.

article thumbnail

CynergisTek Signs Six-Figure Extension Contract with Nationally Ranked Hospital

CyberSecurity Insiders

As healthcare continues to be a target of cyber-related incidents, hospitals need to take necessary steps to not only identify cyber risks, but follow through with prioritized remediation efforts to protect patient data, and avoid obstructing patient care.

article thumbnail

Author Q&A: Former privacy officer urges leaders to prioritize security as part of cloud migration

The Last Watchdog

Cyber threats have steadily intensified each year since I began writing about privacy and cybersecurity for USA TODAY in 2004. Cyber risks from third-party vendors further complicate the situation. Riccardi: Basic cyber hygiene is 90 percent of what cybersecurity is all about.

article thumbnail

Spotlight Podcast: At 15 Cybersecurity Awareness Month Grows with Cyber Risk

The Security Ledger

And this year is a special occasion: a Quinceañera of sorts recognizing 15 years since the first Cybersecurity Awareness Month in 2004. As my guests this week note: the goals of Cyber Security focus and importance of cyber security awareness month has changed a lot since the early 2000s. October is Cybersecurity Awareness Month.