The biggest data breach fines, penalties, and settlements so far

Sizable fines assessed for data breaches in recent years suggest that regulators are getting more serious about cracking down on organizations that don’t properly protect consumer data.

The biggest data breach fines, penalties, and settlements so far | CSO Online

Preventing Ransomware Attacks at Scale

A future where ransomware attacks are significantly harder to pull off is possible. It’s time for software companies to make this future a reality

Preventing Ransomware Attacks at Scale (hbr.org)

Where Are You on the Cybersecurity Readiness Index? Cisco thinks you’re Probably Overconfident

The most alarming takeaway from Cisco’s new Cybersecurity Readiness Index report is that even after decades of having the importance of cybersecurity driven home, cyber threats are still taken too lightly.

Where Are You on the Cybersecurity Readiness Index? Cisco Thinks You’re Probably Overconfident (informationweek.com)

Navigating Through the Storm: Cybersecurity and its Stakeholders

From disrupting critical navigation systems to potentially stealing sensitive cargo data, cyberattacks pose a significant risk to safety, security, and overall operational efficiency

Navigating Through the Storm: Cybersecurity and its Stakeholders (maritime-executive.com)

What is success in cybersecurity? Failing less.

Defenders aren’t measured by pure wins or losses. Intrusions will happen, and their job is to keep a bad situation from getting worse.

What is success in cybersecurity? Failing less. | Cybersecurity Dive

Minimum Viable Compliance: What You Should Care About and Why

Understand what security measures you have in place, what you need to keep secure, and what rules you have to show compliance with.

Minimum Viable Compliance: What You Should Care About and Why (darkreading.com)

Why cyber-attacks shouldn’t be viewed as isolated incidents

The cybercrime landscape is evolving. With too many threats to guarantee safety, businesses must focus on curating an effective security culture to stay prepared

Why cyber attacks shouldn’t be viewed as isolated incidents – Raconteur

Counting the Cost: The Price of Security Neglect

Security and privacy leaders have had to evolve to become powerful partners in convincing their organizations why investment in security is so important.

Counting the Cost: The Price of Security Neglect – CPO Magazine

Cybersecurity In A Data-Driven World: The Problem Of Invalid Data

Cybersecurity as an industry has a data-maturity problem and an even larger observability issue. We use anecdotal breach and vulnerability data when considering security tools and controls to invest in

Cybersecurity In A Data-Driven World: The Problem Of Invalid Data (forbes.com)

How threat intelligence can improve vulnerability management outcomes

Threat Intelligence in conjunction with established vulnerability management practices can help organizations identify, prioritize and remediate vulnerabilities that have a higher risk profile or have the potential to have a greater impact on an organization.

How threat intelligence can improve vulnerability management outcomes – Intelligent CIO APAC

Share: