Remove 2005 Remove Internet Remove Risk
article thumbnail

MY TAKE: How digital technology and the rising gig economy are exacerbating third-party risks

The Last Watchdog

Accounting for third-party risks is now mandated by regulations — with teeth. Allen is a widely respected thought leader on this topic, having launched Shared Assessments in 2005 as an intel-sharing and training consortium focused on third-party risks. That out of the way, business can proceed with less risk.

Risk 164
article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Turn the corner into 2019 and we find Citigroup, CapitalOne, Wells Fargo and HSBC Life Insurance among a host of firms hitting the crisis button after their customers’ records turned up on a database of some 24 million financial and banking documents found parked on an Internet-accessible server — without so much as password protection.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

On the 20th Safer Internet Day, what was security like back in 2004?

Malwarebytes

Today is the 20th Safer Internet Day. 2004 was a key year for several safety activities, encompassing both Safer Internet Day and the Safer Internet Forum. Was the general state of the Internet at the time so bad that all of these events sprang up almost out of necessity? You may be asking, why 2004?

article thumbnail

Exclusive Interview With David Monnier, Chief Evangelist Of Team Cymru

SecureBlitz

In this interview, we spoke with David Monnier, Chief Evangelist at Team Cymru, a risk management solution launched in 2005 with a network that extends to 143 CSIRT teams in 86 countries and over 1,000 network operators and ISP community that helps keep the internet safe.

article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

In the early days of the Internet, coders created new programs for the sake of writing good code, then made it available for anyone to use and extend, license free. However, once the commercial Internet took hold, developers began leveraging open-source components far and wide in proprietary systems. Legacy tech’s role.

Firewall 223
article thumbnail

MY TAKE: Agile cryptography is coming, now that ‘attribute-based encryption’ is ready for prime time

The Last Watchdog

All of the technical innovation cybersecurity vendors are churning out to deal with ever-expanding cyber risks, at the end of the day, come down to protecting encrypted data. And since 2005 or so, one area of focus has been on sharpening the math formulas that make attribute-based encryption possible.

article thumbnail

10KBLAZE exploits could affect 9 out of 10 SAP installs of more than 50k customers

Security Affairs

The availability of 10KBLAZE PoC exploits for old SAP configuration issue poses a severe risk of attacks for business applications. The risk of cyber attacks against SAP systems is increased after security researchers released PoC exploits for old SAP configuration flaws. ” reads the analysis published by Onapsis.