Remove Cyber Risk Remove Cybersecurity Remove Firewall Remove Internet
article thumbnail

Q&A: NIST’s new ‘Enterprise Risk Management’ guidelines push cyber risks to board level

The Last Watchdog

Related: Poll shows seniors execs get cybersecurity A hazard is anything that can interfere with a company meeting its objectives; it could be something physical, such as a fire, a theft or a natural disaster; or it could be an abstract risk, such as a lawsuit or a regulatory fine. I had the chance to drill down on this with Clinton.

article thumbnail

GUEST ESSAY: As cyber risks rise in 2020, as they surely will, don’t overlook physical security

The Last Watchdog

All the encryption , firewalls , cryptography, SCADA systems , and other IT security measures would be useless if that were to occur. The internet of things (IoT) is widening the sphere of physical security as smart devices connected to business systems via the internet may be located outside of established secure perimeters.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH: Trend Micro flattens cyber risks — from software development to deployment

The Last Watchdog

As jarring as this abrupt shift to remote work has been for countless companies, government agencies and educational institutions, it has conversely been a huge boon for cyber criminals. The Internet from its inception has presented a wide open attack vector to threat actors. Something needs to be done to flatten the cyber risk curve.

article thumbnail

How to Use Your Asset Management Software to Reduce Cyber Risks

CyberSecurity Insiders

In fact, in the cybersecurity world, you can’t protect something if you have no idea where the threat exists. . . As a result, asset management has become an essential part of the base of cybersecurity processes in all sorts of businesses. . . Let us now see how you can make the best use of ITAM to minimize cyber attacks.

article thumbnail

Black Hat Fireside Chat: MSSPs are well-positioned to help companies achieve cyber resiliency

The Last Watchdog

MSSPs arrived on the scene 15 years ago to supply device security as a contracted service: antivirus, firewalls, email security and the like. Today, big IT services companies, as well as legacy cybersecurity vendors, are hustling to essentially give shape to the next-gen MSSP, if you will. Guest expert: Chris Prewitt, CTO, Inversion6.

Antivirus 222
article thumbnail

Safer Internet Day: The importance of training employees to keep organizations safe

CyberSecurity Insiders

Safer Internet Day is a reminder for organizations to train and regularly refresh employee awareness around cybersecurity. With regular headlines of the latest cyber-attack occurring, organizations must focus on cybersecurity and using the internet safely. Remote working risks.

article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

By no means has the cybersecurity community been blind to the complex security challenges spinning out of digital transformation. I’ve recently had several deep-dive discussions with cybersecurity experts at Juniper Networks, about this. The intensely competitive cybersecurity talent market is partly to blame here.

Firewall 223