Russian authorities typically turn a blind eye to cybercrime committed by citizens, provided they target foreigners. But as the recent "BuyBest" arrests of 25 individuals demonstrate, authorities do not tolerate criminals that target Russians, and especially not anyone who targets Russian banks.
At its core, cybersecurity is about applying scarce resources to the highest risk. And nothing quite puts that tenet to the test like the COVID-19 pandemic. Jim Routh, CISO of MassMutual, discusses the challenges of managing a remote workforce and third-party relationships during this crisis.
While responding to the COVID-19 crisis, supply chain risks can be better managed if an organization continues to rely on its longtime vendors, says Daniel Bowden, CISO at Sentara Healthcare, who offers insights on third-party security risk management in the current environment.
An emerging technology, Vvendor Privileged Access Management (VPAM) can provide both operational efficiencies and increased security in your projected ROI analysis. And that is a rare combination in InfoSec these days.
As automobile manufacturers and others rush to shift to production of ventilators and other medical equipment and supplies to help fight the COVID-19 pandemic, they must take steps to ensure security, privacy and safety risks are addressed, says technology attorney Steven Teppler.
2019 was the year when enterprises across all sectors woke up to the scale of their third-party risk challenges. How will they respond to those risks in 2020? Jaymin Desai of OneTrust shares insights.
Today's organizations are increasingly using multi-cloud environments, exacerbating third-party risk, says Frank Price of CyberGRX, who provides risk management insights.
While conventional approaches to third-party risk management remain unchanged, the industry is transitioning to a new "normal," says RiskRecon CEO Kelly White.
Want to maximize your digital transformation project success and impact? Start by ensuring that you correctly explain risk to stakeholders, as well as continually benchmark your organization's risk management maturity, says ServiceNow's Barbara Kay.
How can the use of "smart contracts" based on distributed ledger technology help improve the overall security picture for healthcare system supply chains? Mitch Parker, CISO of Indiana University Health, explains.
In a joint interview at the RSA 2020 conference, Edna Conway of Microsoft and Wendy Nather of Cisco discuss how to apply "zero trust" to supply chain security.
Hacking incidents involving email appear to be the most common type of major health data breach being reported to federal regulators so far in 2020. But the largest breach added to the tally involved a type of incident rarely seen in recent years: the theft of an unencrypted laptop.
The latest edition of the ISMG Security Report offers an analysis of the missteps that led to problems with the app used in this week's Democratic presidential caucuses in Iowa. Also featured: growing privacy concerns about facial recognition and business continuity tips for dealing with the coronavirus.
Here's a close look at the critical components of the Payment Card Industry Data Security Standard, version 3.2, and some advice on how to comply with its authentication requirements.
P&N Bank in Perth, Australia, says a server upgrade gone wrong led to the breach of sensitive personal information in its customer relationship management system. The incident is another example how organizations can be imperilled by mistakes on the part of their suppliers.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.