Is your security program paying off for the business? Most organizations are looking at the wrong information and data for measuring security effectiveness. If you can’t properly measure your security posture, how do you know it’s working? How do you improve it? [Read More]
Yahoo's claim that it is the victim of a gigantic state-sponsored hack raises the question of whether it is the latest target for hackers with the backing of Russia, China or even North Korea, experts say. [Read More]
Yahoo faced pressure to explain how it sustained a massive cyber-attack -- one of the biggest ever, and allegedly state-sponsored -- allowing hackers to steal data from half a billion users two years ago. [Read More]
The SWIFT Daily Validation Reports are expected to be introduced during December 2016. It might be "another couple of years before anything is formalized" from the committee of central banks. [Read More]
Implementing a Zero Trust model represents a dramatic change and requires a well-planned transition that should be complimented by efforts to operationalize cyber risk detection, prevention, and response.
In order to demonstrate they understand how cyber risk plays into their company’s operations and bottom line, CISOs must communicate risk in the same way other business leaders communicate about other operational risks.