article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Related: Atrium Health breach highlights third-party risks. One might assume top-tier financial services firms and healthcare vendors would have solved third-party cyber exposures by now. Third-party cyber risks are likely to persist at the current scale for a while longer. Uphill battle.

article thumbnail

Spotlight Podcast: RADICL Is Coming To The Rescue Of Defense SMBs

The Security Ledger

Related Stories Is a DEF CON Village the right way to assess AI risk? and other militaries have always been at the top of the target list for so-called “advanced persistent threat” cyber adversaries. The post Spotlight Podcast: RADICL Is Coming To The Rescue Of. Read the whole entry. » Sickened by Software?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: A path for SMBs to achieve security maturity: start small controlling privileged accounts

The Last Watchdog

The challenge of embracing digital transformation while also quelling the accompanying cyber risks has never been greater for small- and mid-sized businesses. Somehow SMBs must keep pace competitively, while also tamping down the rising risk of suffering a catastrophic network breach. Remote desktop risks.

article thumbnail

Cyber Insurance: The Good, the Bad, and the Ugly

IT Security Guru

As a result, it’s difficult to gauge how at risk an organisation is. Cybersecurity professionals remain divided as to the future of cyber insurance. At the turn of the millennium, Lloyds of London wrote the first modern cyber insurance policy. Astoundingly, the cyber insurance market shrank relative to the Internet economy.

article thumbnail

MY TAKE: Agile cryptography is coming, now that ‘attribute-based encryption’ is ready for prime time

The Last Watchdog

All of the technical innovation cybersecurity vendors are churning out to deal with ever-expanding cyber risks, at the end of the day, come down to protecting encrypted data. And since 2005 or so, one area of focus has been on sharpening the math formulas that make attribute-based encryption possible.

article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

They’re now the norm and security teams must assess and manage the risk of these stacks.”. Complex and evolving cyber risks need to be resolved, for instance, when it comes to securing human and machine identities, tightening supply chains, mitigating third-party risks, protecting critical infrastructure and preserving individuals’ privacy.

Firewall 223
article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

AllegisCyber Capital was founded in 1996 to serve the growing cyber business ecosystem. Company Sector Year Status Verodin Cybersecurity analytics 2018 Acquired by FireEye Kenna Security Risk management 2018 Acquired by Cisco PhishMe Incident response 2016 Acquired: P.E. AllegisCyber Capital. AllegisCyber Investments. BVP Investments.