In the Era of Generative AI, Establish a ‘Risk Mindset’

Software and platforms companies must establish a risk mindset across their entire organization so that every function and employee has the tools and capabilities to detect and mitigate threats.

In the Era of Generative AI, Establish a ‘Risk Mindset’ (informationweek.com)

Impact of cybersecurity organizational structure on ransomware outcomes: The most successful models

We delve deeper into how security team structure impacts ransomware attack recovery operations and how day-to-day cybersecurity outcomes are more broadly impacted by organizational structure.

Impact of cybersecurity organizational structure on ransomware outcomes: The most successful models | SC Media (scmagazine.com)

Why IAM is central to cyber security.

Identity and access management (IAM) remains central to cyber security, with phishing and compromised credentials often being exploited by cyber criminals to gain access to an organisation’s IT environment.

Why IAM is central to cyber security | Computer Weekly

Navigating Data Breach Communication: A Blueprint For Executives

As ransomware proliferates and malicious actors become increasingly sophisticated, the need for robust crisis communication strategies has never been more pronounced.

Navigating Data Breach Communication: A Blueprint For Executives (forbes.com)

Software Security: Too Little Vendor Accountability, Experts Say

Actual legislation is a long shot and a decade away, but policy experts are looking to jump-start the conversation around greater legal liability for insecure software products.

Software Security: Too Little Vendor Accountability, Experts Say (darkreading.com)

Cybersecurity lessons from Latin America’s battle against ransomware threats

Latin American nations are intensifying their efforts to combat the growing threat of ransomware attacks, showcasing a defensive stance and a proactive approach to enhancing cyber resilience and innovation and protecting vital infrastructure.

What Latin America can teach us on resilient cybersecurity | World Economic Forum (weforum.org)

Most attacks affecting SMBs target five older vulnerabilities

Attackers continue to aggressively target small and mid-size businesses using high-profile vulnerabilities dating back a decade or more, network telemetry shows.

Most attacks affecting SMBs target five older vulnerabilities | CSO Online

Cyber risk is increasing . . . and this time it’s personal

New US rules around the disclosure of data breaches are heaping more pressure on information security chiefs

Cyber risk is increasing . . . and this time it’s personal (ft.com)

Eight cyber priorities for risk managers

What does cyber agility look like for financial institutions navigating rapid change? – 30 senior cyber risk leaders share their eight priorities

Eight cyber priorities for risk managers | Opinion | Strategic Risk Global (strategic-risk-global.com)

New proposed federal data privacy law suggests big changes

With the American Privacy Rights Act of 2024, the U.S. government established the first national privacy policy establishing national consumer data privacy rights and also set standards for data security.

New proposed federal data privacy law suggests big changes (securityintelligence.com)

Share: