AI risk managed detection and response

A 2023 Mantra: Think of Cybersecurity Risk as Business Risk

The line between business risk and cybersecurity risk has been obliterated. Increasingly, companies cannot separate risk models built around financial uncertainty and legal liabilities from IT security risk. For risk management officers, ...
Security Boulevard
cybersecurity energy infrastructure

How Demanding Conditions Impact Critical Infrastructure Security

Enterprises already understand how important a role physical security plays in protecting their staff, work environments and privileged information from outsiders. Fences, walls, security guards and RFID-controlled doors all help organizations protect ...
Security Boulevard
identity governance security Spera deepfake identity management

What you Missed in the White House National Cybersecurity Strategy

On the heels of the White House’s National Cybersecurity Strategy, there were plenty of reactions and opinions about how cybersecurity strategies and priorities must change. But most people missed one critical callout: ...
Security Boulevard

How Zero Trust Enables the National Cybersecurity Strategy

| | Blog, cyber, data
5 min read The recently released US National Cybersecurity Strategy stresses a commitment to the application of a zero-trust architecture as well as the modernization of both IT and OT systems. The ...

Lessons Learned from the Ongoing LastPass Data Breach Saga

| | Blog, cyber, data
5 min read The LastPass data breach debacle could happen to anyone. We break down the ongoing attacks and offer tips for avoiding a similar fate. The post Lessons Learned from the ...
Understanding Pseudonymization and Anonymization

Pseudonymization vs. Anonymization

A common challenge organizations face is striking the balance between employee privacy and insider risk monitoring. Using pseudonymization, organizations can apply the principle of proportionality to monitor employees based on the nature ...
Phobos ransomware CISA

How Data Governance Policies Impact Cybersecurity

Cybersecurity protects a wide range of electronic assets, but data is the most important. When you boil it down, most cybersecurity practices and technologies center around sensitive information, whether directly or indirectly ...
Security Boulevard
consumers privacy framework

California’s Sephora Settlement Puts Consumer Privacy First

Last fall, California drew first blood when it agreed to a $1.2 million settlement with Sephora over the cosmetics company’s violations of the California Consumer Privacy Act (CCPA). Attorney General Rob Bonta ...
Security Boulevard

LastPass Breach: What You Need to Know

| | Blog, cyber, data
3 min read This blog examines the circumstances of the November 2022 LastPass data breach and how it connects to a breach earlier in the year. The post LastPass Breach: What You ...

UK Construction: Cybersecurity Experts Defend Joint Ventures

After years of falling behind, the construction industry has realised the importance of its data. Construction-related businesses invested a remarkable 188% more in cybersecurity in 2018–19. Data leaks and cyberattacks have jolted ...