The aftershocks of the disruption created by the coronavirus will be felt for years to come. Almost overnight, we’ve had to completely change the way we do business. The...
Is Cyber 2024 Stuff of Movies? We often think of modern cybersecurity as a movie scene with hooded hackers in the dark contending with cyber experts facing flashing screens....
What are Vendor Risk Assessments? Vendor assessment is the process of assessing and identifying risks posed by your suppliers and service providers. Vendor assessments mitigate third-party vendor risk by...
Organizations increasingly rely on third-party suppliers to support critical business functions. This upward trend has accelerated in the last decade and is expected to continue growing. The global shift...
“Stand straight.” It’s a directive we’ve all heard at some point in our lives and is worth heeding. Standing straight is a sign of good spinal posture. Posture is...
The growing body of stringent data privacy laws has pushed for better methods of evidence collection and audit trails to record activity that doubles as evidence for certification audits....
The Third Digital Wave The digital transformation of the last few decades has completely changed the way individuals and businesses interact. Top that with Covid 19 which has put...
News outlets confirm what we don’t want to know. A single cyberattack can bring a sprawling corporate network to a complete standstill. Senator Mark Warner, who chairs the Senate...
What is Controlled Unclassified Information? CUI stands for Controlled Unclassified Information. CUI is defined as government-related information that needs to be protected and transmitted using controls compatible with government...
Gap analysis is a starting point for a business to compare its current state of information security against specific industry requirements. It can also determine how and whether to...
Since the 2008 recession, we’ve seen years of mostly low inflation, declining interest rates, and healthy stock markets. As inflation and rising interest rates are starting to affect the...
Due diligence and due care are commonly used interchangeably, but in the world of cybersecurity, they have distinct meanings that must be understood. Both terms are involved with protecting...
The GRC Revolution Unlike many catchphrases in the cyber dictionary, GRC (governance, risk, and compliance) is not a passing fad. The term was introduced two decades ago and has...
Inflation is already impacting organizations worldwide, and its impact on the cost of cybersecurity incidents must be considered. The Consumer Price Index, an essential KPI used when evaluating inflation...
Data is the life force of business today. What would happen to a business if it was cut off from its source? Data loss has the potential to inflict...
It’s estimated that cybercrime collectively costs organizations $16.4 billion per day, or $190,000 per second. Evaluating risks, implementing mitigating controls, and measuring the effectiveness of those controls are essential...
Does your business have a disaster recovery plan? If not, it should. In today’s threat-rich business landscape, unfortunately it’s not a question of if you’ll find yourself contending with...
Imagine if you knew someone was about to break into your house. With adequate time to prepare, you could place locks on each room, add sensors, and lock away...
Mergers and acquisitions (M&A) are intended to boost the value of your brand or business when you find an opportunity to combine the capabilities of your organization with another. ...
Security vs. compliance—that’s the million dollar question every organization is trying to answer. And thanks to the rapid digital transformations occurring in virtually every industry, the stakes have never...
Placing data on the cloud always sounds like a great idea – many big companies are doing it and there seems to be endless space. However, like any other...
Digitization has made both our personal lives and business workflows more convenient and efficient than ever, but it’s also introduced significant cybersecurity risks. In our personal lives, it’s normal...