How to manage IT risk without killing innovation

Startup slogans are inescapable in tech: Move fast. Break things. Minimum viable product. These are exciting ideas, for sure, but to put them to use in IT, you’ll need to tailor them to your context. For IT executives running established businesses, the risk-reward scenario is different. Thousands or millions of customers depend on your infrastructure….

Cambridge Analytica Says it is ‘No Bond Villain’

Cambridge Analytica claimed Tuesday it was “no Bond villain” as it vehemently denied exploiting Facebook users’ data for the election campaign of US President Donald Trump. The marketing analytics firm stressed it had deleted data about Facebook users obtained in breach of the social network’s terms of service. The information had been gathered via a…

Largest inhibitor of cyber insurance market growth? Silent cyber risk

A new study of the UK cyber risk insurance and broker community reveals startling findings. First and foremost, the insurance industry needs to address non-affirmative cyber in a meaningful way. Second, measurement of cyber risk in financial terms is highly deficient among insurance customers and the insurance industry itself. More than three-quarters (77 percent) of UK cyber…

GDPR: It’s an issue of transparency

The General Data Protection Regulation (GDPR) has been on the lips of security professionals for a long time now – but in just over a month, it will become a reality. While it is easy to get stuck with reviewing the potential fines or setting up efficient security procedures to ensure compliance, many are still…

FDA plans to improve medical device cybersecurity

The US Food and Drug Administration (FDA) plans to tackle security issues related to medical devices and has released a plan of action it means to implement in the near future. Broadly, plan is as follows: Establish a robust medical device patient safety net in the US Explore regulatory options to streamline and modernize timely implementation of…

BrandPost: How to build a good cyber defense routine

Although it may seem fast-paced and glamorous, the cyber threat landscape is actually more populated with simple, garden-variety attacks than sophisticated and exotic techniques. With free tools and kits, it’s become easier than ever to engage in phishing, cross-site scripting, and other malicious activities. When we imagine all cybercriminals as masterminds using bleeding-edge tools, we…