risk assessment - Tagged - Security Boulevard

VPNs and Trust

TorrentFreak surveyed nineteen VPN providers, asking them questions about their privacy practices: what data they keep, how they respond to court order, what country they are incorporated in, and so on. Most ...

Presidential Cybersecurity and Pelotons

President Biden wants his Peloton in the White House. For those who have missed the hype, it’s an Internet-connected stationary bicycle. It has a screen, a camera, and a microphone. You can ...

ICS Cybersecurity: Zero Trust & CARTA for Operational Technology (OT)

The integration of IT and OT is a well-established trend, driven by the business benefits that typically come with richer real-time information sharing, analysis, and response. While the cybersecurity concerns of this ...

Jump-Start the Cyber Insurance Market to Drive Better OT Security

Experts have been predicting for decades that the insurance industry would eventually help drive better private sector cybersecurity practices by pricing premiums based on cybersecurity risk ...
Build a resilient cybersecurity framework by transforming your IT team into a security team

Build a resilient cybersecurity framework by transforming your IT team into a security team

More organizations than ever before have shifted to a hybrid work culture to reduce the impact of COVID-19. This unprecedented change has not only given rise to new security challenges, but has ...

Negotiating with Ransomware Gangs

Really interesting conversation with someone who negotiates with ransomware gangs: For now, it seems that paying ransomware, while obviously risky and empowering/encouraging ransomware attackers, can perhaps be comported so as not to ...

Cybersecurity Lessons from the Pandemic: Perception of Risk

The more “mature” among us may recall when decision-making under uncertainty was based on the concept of “rational economic man.” We estimated or calculated the probability and amount of a loss (or ...

Cybersecurity Lessons from the Pandemic – Positive and Negative Feedback

Systems use negative feedback in order to converge to stability and equilibrium (a positive quest). Positive-feedback systems diverge, which leads to instability and sometimes surging out of control (usually a negative outcome) ...

Common Surprises from Your Maritime Cyber Risk Management Assessment

Cyber-related risk and threats to your vessel network are mounting, and so are the maritime industry cybersecurity compliance requirements. Between the upcoming International Maritime Organization’s (IMO) Resolution MSC.428(98) and other programs like ...
data recovery

Business Continuity: Planning for the Next Pandemic

Writing a business continuity plan will help safeguard your operations from unexpected events COVID-19 continues to change business operations in ways that would have been unimaginable at the start of 2020. Some ...
Security Boulevard