Remove Accountability Remove Cyber Risk Remove Event Remove Information Security
article thumbnail

How to Use Your Asset Management Software to Reduce Cyber Risks

CyberSecurity Insiders

Yes, one lapse on a spam email, one inadequate password, one abandoned account, or a malfunctioning asset can cause havoc. . It aids in the enforcement of IT security practices when dealing with cyber assets. As you might expect, developing a specific strategy leads to quicker response times in the event of an incident. . .

article thumbnail

GUEST ESSAY: As cyber risks rise in 2020, as they surely will, don’t overlook physical security

The Last Watchdog

Physical security is the protection of personnel and IT infrastructure (such as hardware, software, and data) from physical actions and events that could cause severe damage to an organization. Related: Good to know about IoT Physical security is often a second thought when it comes to information security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

“Accountability framework” proposed to promote secure health care practices

SC Magazine

In response, the non-profit has offered a glimpse into its work-in-progress “Accountability Framework,” designed to help relevant health care stakeholders take responsibility for keeping cyberspace secure by enforcing behavioral norms and also by understanding and rooting out the underlying causes when attacks do happen. “Too

article thumbnail

Fitch Ratings: Cyberattacks could pose a material risk to water and sewer utilities

Security Affairs

Fitch Ratings published an alert last week to warn of the “material risk” to water and sewer utilities caused by cyber attacks that could also impact their ability to repay debt. ” Credit rating agencies assess the capacity for utilities to repay their debt and cyber attacks could impact it. . Pierluigi Paganini.

Risk 111
article thumbnail

New CACTUS ransomware appeared in the threat landscape

Security Affairs

“CACTUS essentially encrypts itself, making it harder to detect and helping it evade antivirus and network monitoring tools,” Laurie Iacono, Associate Managing Director for Cyber Risk at Kroll, told Bleeping Computer. The Cactus ransomware relies on multiple legitimate tools (e.g.

article thumbnail

SPOTLIGHT: Women in Cybersecurity

McAfee

The RSA Conference USA 2019 held in San Francisco — which is the world’s largest cybersecurity event with more than 40,000 people and 740 speakers — is a decent measuring stick for representation of women in this field. “At Please join McAfee, AWS, and our customers to discuss the impact women are having on information security in the cloud.

article thumbnail

As market for cyber insurance booms, watchdog calls for better data

SC Magazine

In a report released May 20, the Government Accountability Office looked at how the private cybersecurity insurance market has developed over the past five yearsRich Baich is global chief information security officer for insurance giant AIG. Photo by Spencer Platt/Getty Images).