CYBER THIS WEEK – DEC 03, 2023
Cybersecurity Insurance: Once Optional, Now Essential
Organizations, now more than ever, should view cyber insurance as an integral component of a holistic strategy where people and processes play a pivotal role in securing today’s interconnected networks, devices, and applications. It’s a strategic necessity, not just a business cost.
Cybersecurity Insurance: Once Optional, Now Essential (informationweek.com)
Thought GDPR Compliance Was Hard? Buckle Up
Five years since the European Union’s General Data Protection Regulation (GDPR) took effect, its fingerprints are everywhere: from proliferating privacy laws worldwide to the now-ubiquitous consent banners seen across websites of every kind.
Thought GDPR Compliance Was Hard? Buckle Up (darkreading.com)
Making SASE and zero trust work for the enterprise
New technologies like SASE and zero trust offer compelling solutions, but only if thoughtfully implemented with interoperability and standards in mind.
Making SASE and zero trust work for the enterprise | Security Magazine
How to maintain a solid cybersecurity posture during a natural disaster
How do I keep my data and operations cyber secure yet accessible during and after a natural disaster? Here are some useful answers to this question from IT professionals whose business is data security.
How to maintain a solid cybersecurity posture during a natural disaster | CSO Online
Navigating CISOs’ top 4 challenges
The field of cybersecurity is dynamic, with conflicting, high-stakes priorities and never-ending time-sensitive tasks. Working diligently to protect their organizations, CISOs face a variety of challenges without simple answers, and the steps to address them are often nebulous, time-consuming and resource-intensive.
Navigating CISOs’ top 4 challenges | Security Magazine
Guarding the Grid: Navigating the Current and Future Landscape of Utility Cybersecurity
The electric grid isn’t just about transmitting electrons anymore; it’s about transmitting data, and with it comes an expanded threat landscape. We must leverage technology for progress while also safeguarding it against potential harm.
Guarding the Grid: Navigating the Current and Future Landscape of Utility Cybersecurity | Tripwire
SEC’s cyber disclosure rules: Key considerations for the board, C-suite and risk managers
Each business stakeholder has a different cyber risk management responsibility. Given the SEC’s coming disclosure rules, it’s even more important to outline who owns what.
Securing data and systems with proactive penetration testing
By simulating hacker attacks, pentests challenge your system’s defenses, testing for vulnerabilities that could let in real threats.
Enhancing securing with penetration testing (cshub.com)
The Glaring Gap in Your Cybersecurity Posture: Domain Security
Blind spots are preventable and domain security does not have to be overlooked. Domain protection should be seen as a branch of cybersecurity that organizations bring to the forefront of their business strategy – and another business asset to successfully secure.
The Glaring Gap in Your Cybersecurity Posture: Domain Security – CPO Magazine
19 Tech Experts Bust Common Cybersecurity Myths And Misconceptions
19 members of Forbes Technology Council shed light on some prevalent cybersecurity myths. They also provide critical insights into the significant cybersecurity challenges that organizations face today and how to overcome them.
19 Tech Experts Bust Common Cybersecurity Myths And Misconceptions (forbes.com)