Conversations in Risk-Based Security

Cyber Security is Everyone’s Responsibility

Posted by Sam Friedman on Feb 6, 2019 1:35:07 PM

Companies spend millions every year on products and services to fix all their cyber security vulnerabilities. Then they spend just as much money on highly skilled, well-trained cyber professionals to manage those systems. All those resources are useless when an accountant, or a C-level’s executive assistant, or an HR manager, clicks a link they received in their email and BOOM.

Read More

Topics: cybersecurity, cyber range

What is the Business Case for MSSP?

Posted by Rajni Goel on Sep 4, 2018 10:59:24 AM

Much has been written about the benefits of an MSSP, especially if you are a big organization.  It allows for a consistent, centralized, and transparent view into your organization’s security platform.  But, how do you decide if an “in-house” security management program is effective enough? What is the cost-benefit analysis when deciding to budget expenses for in-house versus out-sourcing?

Read More

Topics: cybersecurity, MSSP

Strategic Compromise Allows Attackers to Undermine Supply Chain

Posted by Doug Yarabinetz on Jul 9, 2018 2:24:51 PM

One-Fifth Of Enterprise Respondents Reported A Third-Party Breach according to Forrester's Top Cybersecurity Threats of 2018.

Strategic Compromise Will Allow Attackers To Undermine Your Supply Chain

Your partners are also under threat: 21% of global enterprise network security decision makers have experienced a security incident involving a third party . Third-party risk is frequently discussed as an exposure due to data shared with partner companies and data processors. This type of downstream risk can sometimes put people in mortal danger as with the TigerSwan breach, where a third party leaked resume information for foreign nationals that included admissions of their complicity with US forces and home contact information.  Too frequently, supply chain issues that are upstream to your organization are ignored and incidents go unnoticed and unpublicized.
Read More

Topics: cybersecurity

Practice Cyber Combat on a Cyber Range

Posted by Joseph Wilson on Jun 28, 2018 11:38:36 AM

Cyber security is a skill based occupation.  The only way to improve a cybersecurity expert skill set, is by accumulating hands-on experience.  Similar to fighter pilots, who don’t often face the challenges and threats of the real world , training cybersecurity experts can be effective only  by simulating hyper-realistic scenarios which allows cybersecurity individuals and teams to face a real threat, and improve their skills based on the experiences.

Read More

Topics: cybersecurity, cyber range

Why Cybersecurity Should Be A Top Priority For Small Businesses

Posted by Doug Yarabinetz on May 10, 2018 3:34:04 PM

Every year, far too many businesses are compromised by cybercriminals, and each time, important data and sensitive information are accessed and exploited. In all situations, cybercriminals will use their best technology to steal data and even the finances of big businesses.

Read More

Topics: cybersecurity

Healthcare Industry Case Study: Cybersecurity and Risk Management

Posted by Doug Yarabinetz on Aug 1, 2017 2:42:41 PM

Many companies in the healthcare market struggle with compliance projects and finding the time and knowledgeable resources, as-well-as the budget, to adhere to government regulations in a timely manner.

Read More

Topics: Risk Management, cybersecurity, compliance mandates, FISMA Compliance

Swiss Product Manufacturer Partners with Lynx To Sell Lucy!

Posted by Doug Yarabinetz on Jul 21, 2017 12:20:36 PM

ZURICH (20.7.2017) LUCY Security is growing and innovating: Certified partner in the US now delivers new anti-ransomware scenarios with LUCY V3.6. With approximately 25% of sales, the US market represents the most important market area for the Swiss product manufacturer.

The IT risk, compliance and cybersecurity company, Lynx Technology Partners, (LYNX) strengthens Lucy's existing presence in the US market.

Read More

Topics: Security, cybersecurity

WHERE IS MY IT RISK?

Posted by Doug Yarabinetz on Mar 21, 2017 12:22:09 PM

Managing IT risk is part of running any business these days. Regardless of what business you’re in, understanding IT risk can help you increase network security, reduce management costs and achieve greater compliance. Corporate leaders who fail to identify, assess and mitigate IT risk are setting themselves up for serious security breaches and financial losses down the road.

Read More

Topics: Risk Management, Security, cybersecurity

Managed Security: Boost Your Security Posture Through Outsourcing

Posted by Doug Yarabinetz on Mar 7, 2017 7:42:50 PM

Join us for the webinar "Managed Security - How to Boost Your Security Posture Through Outsourcing Security to Experts featuring research from the 2017 Cybersecurity Trends Spotlight Report published by the Information Security Community on LinkedIn in partnership with Crowd Research.

Read More

Topics: Risk Management, cybersecurity, GRC

Bobby Dominguez to Examine IT Risk Programs and the NIST CSF

Posted by Doug Yarabinetz on Oct 13, 2016 1:03:19 PM

Bobby Dominguez will discuss the operationalization of the NIST Cyber Security Framework to create an information technology risk program at ISACA’s CSX 2016 North America conference in Las Vegas, Nevada, USA, 17-19 October 2016. CSX 2016 North America will be focused on practical cybersecurity solutions and guidance, tailored to every level of a security professional’s career.

Read More

Topics: Risk Management, Security, NIST Cyber Security Framework, cybersecurity