CYBER THIS WEEK – DEC 03, 2023
Cybersecurity Insurance: Once Optional, Now Essential
Organizations, now more than ever, should view cyber insurance as an integral component of a holistic strategy where people and processes play a pivotal role in securing today’s interconnected networks, devices, and applications. It’s a strategic necessity, not just a business cost.
Thought GDPR Compliance Was Hard? Buckle Up
Five years since the European Union’s General Data Protection Regulation (GDPR) took effect, its fingerprints are everywhere: from proliferating privacy laws worldwide to the now-ubiquitous consent banners seen across websites of every kind.
Making SASE and zero trust work for the enterprise
New technologies like SASE and zero trust offer compelling solutions, but only if thoughtfully implemented with interoperability and standards in mind.
How to maintain a solid cybersecurity posture during a natural disaster
How do I keep my data and operations cyber secure yet accessible during and after a natural disaster? Here are some useful answers to this question from IT professionals whose business is data security.
Navigating CISOs’ top 4 challenges
The field of cybersecurity is dynamic, with conflicting, high-stakes priorities and never-ending time-sensitive tasks. Working diligently to protect their organizations, CISOs face a variety of challenges without simple answers, and the steps to address them are often nebulous, time-consuming and resource-intensive.
Guarding the Grid: Navigating the Current and Future Landscape of Utility Cybersecurity
The electric grid isn’t just about transmitting electrons anymore; it’s about transmitting data, and with it comes an expanded threat landscape. We must leverage technology for progress while also safeguarding it against potential harm.
SEC’s cyber disclosure rules: Key considerations for the board, C-suite and risk managers
Each business stakeholder has a different cyber risk management responsibility. Given the SEC’s coming disclosure rules, it’s even more important to outline who owns what.
Securing data and systems with proactive penetration testing
By simulating hacker attacks, pentests challenge your system’s defenses, testing for vulnerabilities that could let in real threats.
The Glaring Gap in Your Cybersecurity Posture: Domain Security
Blind spots are preventable and domain security does not have to be overlooked. Domain protection should be seen as a branch of cybersecurity that organizations bring to the forefront of their business strategy – and another business asset to successfully secure.
19 Tech Experts Bust Common Cybersecurity Myths And Misconceptions
19 members of Forbes Technology Council shed light on some prevalent cybersecurity myths. They also provide critical insights into the significant cybersecurity challenges that organizations face today and how to overcome them.