Remove state-of-security things-good-vulnerability-management-policy-should-include
article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Editor’s note: I recently had the chance to participate in a discussion about the overall state of privacy and cybersecurity with Erin Kapczynski, OneRep’s senior vice president of B2B marketing. Byron is the founder and editor-in-chief of The Last Watchdog on Privacy & Security. Erin: So, let’s get started.

article thumbnail

5 Signs a Cyberattack Is Under Way and 5 Things You Need to Do Before It Happens

Adam Levin

As if cybersecurity weren’t already a red-letter issue, the United States and, most likely, its allies–in other words, the global economic community–are in Iran’s cyber sites, a major player in cyber warfare and politically divisive disinformation campaigns. It could target your employees, not your company.

Passwords 245
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How small businesses can secure employees' mobile devices

Malwarebytes

Fact : 77% of organizations are convinced they're capable of protecting their mobile devices—smartphones, tablets, and laptops (including Chromebooks)—from cybersecurity threats. So what can small business owners do to quickly turn things around? Use a mobile device management (MDM) platform.

article thumbnail

The Cyber Insurance Landscape Has Grown More Complicated

SecureWorld News

When considering adding a cyber insurance policy, organizations, both public and private, must weigh the pros and cons of having insurance to cover against harm caused by a cybersecurity incident. The cost of the policy may outweigh the potential financial benefit in the event of a cyber incident. Is it required?

article thumbnail

Is the Answer to Vulnerabilities Patch Management as a Service?

eSecurity Planet

Patch management is all about helping organizations manage the process of patching software and applications. There are so many patches being issued to address so many vulnerabilities that it is easy to fall behind. There are more than 20,000 new vulnerabilities identified every year – yet the U.S.

Backups 119
article thumbnail

STEPS FORWARD: How the Middle East led the U.S. to adopt smarter mobile security rules

The Last Watchdog

When it comes to securing mobile computing devices, the big challenge businesses have long grappled with is how to protect company assets while at the same time respecting an individual’s privacy. Reacting to the BYOD craze , mobile security frameworks have veered from one partially effective approach to the next over the past decade.

Mobile 205
article thumbnail

Security Experts Assess 2.0 Draft of NIST Cybersecurity Framework

SecureWorld News

Boyle is teaching PLUS Courses on the NIST CSF at all six in-person regional SecureWorld conferences this fall , including Denver on Sept. Boyle is teaching PLUS Courses on the NIST CSF at all six in-person regional SecureWorld conferences this fall , including Denver on Sept. On August 8, 2023, the U.S. 19, Detroit on Sept.