Protecting your cloud from ransomware

For enterprises that use the cloud, the key to being protected starts with understanding the layers that make up the components of their cloud stack. These different layers create multiple potential targets, and for the informed, they each represent a piece of the cloud environment that can be secured against potential threats. Ransomware doesn’t have…

Cyber risk issues resonating in boardrooms

The Cyentia Institute used in-depth surveys and interviews with corporate board members and CISOs to identify specific cyber risk issues resonating in boardrooms. CISOs report they spend most of their boardroom time “giving security guidance” on business enablement and loss avoidance. Surprisingly, CISO respondents reported they spend far less time discussing “data protection” and “brand…

Cyber risk in advanced manufacturing: How to be secure and resilient

Nearly half of surveyed manufacturing executives lack confidence their assets are protected from external threats, according to a new study from Deloitte and the Manufacturers Alliance for Productivity and Innovation (MAPI). Study results indicate nearly 40 percent of surveyed manufacturing companies were affected by cyber incidents in the past 12 months, and 38 percent of…

IF YOU ELIMINATE PHISHING, WILL CYBER RISK DISAPPEAR?

The Verizon DBIR, the Phish Labs’ Phishing Trends & Intelligence Report, and a number of other recent announcements confirm what we all know. Phishing is a popular attack vector. This is an important data point for information security leaders. It also logically leads to two questions: Can you stop phishing to secure your enterprise assets?…