article thumbnail

News alert: AppDirect poll reveals company leaders losing sleep over cyber risks, compliance

The Last Watchdog

28, 2023 – AppDirect , the world’s leading B2B subscription commerce platform, today released key findings from its IT Business Leaders 2024 Outlook Report. Their top areas of concern include cybersecurity risk (58%), information security risk (53%) and compliance risk (39%). San Francisco, Calif.,

article thumbnail

Best Practices Q&A: The importance of articulating how cybersecurity can be a business enabler

The Last Watchdog

The technology and best practices for treating cybersecurity as a business enabler, instead of an onerous cost-center, have long been readily available. These key capabilities fall under the four competencies of oversight, process risk management, technology risk management, and human risk management.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Using social media as a tool to share knowledge on day-to-day Cybersecurity risks

CyberSecurity Insiders

Learn how to educate your social media following on everyday cybersecurity risks. Create Cybersecurity content relevant to your audience Not every company or content creator posting on social media is in the cybersecurity niche, not to mention any offshoots or umbrella niches like technology. This will instill trust in your brand.

Media 89
article thumbnail

News alert: Voxel AI increases funding to $30M, aims to transform industrial workplace safety

The Last Watchdog

Voxel integrates state-of-the-art computer vision technology into existing security cameras to identify hazards, risky behaviors, and operational inefficiencies across a diverse range of workplaces. We’ve proven that our technology has made great strides toward reducing injuries and saving lives.

article thumbnail

Meet Thales at the KuppingerCole European Identity and Cloud Conference 2023

Thales Cloud Protection & Licensing

This necessitates technology that is not overly reliant on third parties, where there is a risk of misuse of trust or non-compliance. The B2B IAM Gap On the event’s last day, don’t leave without listening to Marco Venuti , IAM Business Acceleration Director. These challenges are long-lived in the B2B identity management space.

B2B 71
article thumbnail

Money-making scripts attack organizations

SecureList

We were still finding new versions at the time of writing, so the threat to B2B is still live. Enterprise resources and data remain at risk. Conclusion The B2B sector remains attractive to cybercriminals, who seek to exploit its resources for money-making purposes. cmd and 769BC25454799805E83612F0F896E03F — start.cmd ).

B2B 89
article thumbnail

GUEST ESSAY: The case for network defenders to focus on leading — not lagging — indicators

The Last Watchdog

When it comes to sales targets there is a correlation between increased sales to shareholder value creation, but closing sales in B2B transactions can be time consuming. Minimum adherence to security requirements policy, based on an application’s inherent risk profile, can lead to reduction in risk vulnerabilities.

CISO 217