When a large hospital in an urban area is shut down by ransomware, the disruption can be significant, but when a rural hospital faces a similar cyber outage, the impact on patient safety and the community can be extreme, said Nitin Natarajan of the Cybersecurity and Infrastructure Security Agency.
In late 2023, the debut of ISO/IEC 42001 marked a major advance in AI standards, offering a systematic framework for AI management. Avani Desai of Schellman sees it as a "paradigm shift" that emphasizes managing AI-specific risks that are distinctly different from traditional concerns.
When it comes to InfoSec compliance, consensus across the board is the sooner, the better.
Compliance can play a key role in winning more customers and establishing greater brand trust. However, in order to continuously meet your compliance requirements, automations are critical to collecting the necessary evidence...
While the past two years have proved to be a watershed moment for cloud adoption, the fear of 'unknown unknowns,' to some extent, hampered its growth. Security practitioners are concerned whether investments in infrastructure-as-a-service (IaaS) or platform-as-a-service (PaaS) are endangering their security or...
Gary Hibberd, known as "The Professor of Communicating Cyber" at cybersecurity services provider Cyberfort Group, discusses the biggest changes made since 2013 to the ISO 27001 international standard for an information security management system, which helps organizations secure their data assets.
Percona is an industry leader in providing best-of-breed enterprise-grade support, consulting, managed services, training and software for MySQL, MariaDB, MongoDB, PostgreSQL and other open source databases in on-premises and cloud environments. After noticing gaps across their third-party security and privacy...
What's the purpose of ISO 27701, the new privacy extension to the ISO 27001 information security management standard? Matthieu Grall, CISO and DPO at SodiFrance, a French IT services company, who participated in development of 27701, explains the standard and discusses "privacy by design" compliance issues.
With major data breaches in the news and high-stakes security regulations in effect - including GDPR and the NIS Directive - CISOs worldwide are scrambling to comply with IT standards and avoid hefty fines. Privileged Access Management (PAM) streamlines compliance and overlaps with the requirements of many...
What makes Industrial Control Systems (ICS) so vulnerable to cyber attack? How does this impact the wider enterprise? With IoT-connected equipment and remote management on the rise, security has never been so important. Privileged Access Management (PAM) secures and controls access to critical Industrial...
Two heavyweight cybersecurity regulations, ISO 27001 and the more recent GDPR, are major concerns for CISOs and IT teams worldwide. Conveniently for CISOs and IT teams, however, the two standards have much in common. Here we offer a cross-mapping of the security requirements of each regulation, and how PAM can help...
Companies that want to continue doing business globally will need to take privacy much more seriously, especially in light of increasingly strict new laws, ranging from the California Consumer Privacy Act to the EU's GDPR, says privacy and security expert Michelle Robles.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.