This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Check out best practices for shoring up data security and reducing cyberrisk. And get the latest on cyber scams; zero-day vulnerabilities; and critical infrastructure security. 1 - CSA: How to boost data security and reduce cyberriskRisk assessment gaps. Siloed cyber tools. Misaligned priorities.
government’s latest call for developers to use memory-safe programming languages, as well as its warning for cybersecurity teams regarding cyberrisk from hackers tied to Iran. Plus, get the latest on ransomware trends, the quantum computing cyber threat and more! Check out the U.S.
Embrace change: Stay attuned to emerging cyberrisks and be ready to modify cybersecurity processes accordingly. Show how this capacity to adapt to new cyber threats helps strengthen the organization’s resilience. critical infrastructure organizations must have a plan in case a lengthy, widespread cyber war breaks out.
Since founding Cedric Leighton Associates, he has become an internationally known strategic risk expert. Leighton is also a founding partner of CYFORIX, specializing in the field of cyberrisk. He has been working in the information security, technology risk and compliance field in Australia for more than 25 years.
In the last year, the state has seen a cyberattack take out the top regulatory agency, a data breach compromise the personal information of thousands of applicants for children’s health insurance, and a cyberattack that resulted in confidential information of 58,000 unemployment applicants being stolen, including SSNs and bank information.
Social engineering attacks , including phishing, spam, and viruses introduced via clickable links within e-mail affected 80% of the banking institutions in 2016. VoIP phishing and impersonation also victimized millions of corporate employees across the world , contributing to an even greater cyber threat.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content