Blog

Effective security risk and compliance programs integrate technical risk management and reporting into financial and operational risk management. Failure to implement proper security protocols and best practices can result in weak management processes, an increased risk footprint, and should an incident occur, potential legal repercussions for your organization and senior management team.

The Ukraine situation has led the U.S. Cybersecurity & Infrastructure Security Agency to issue the following guidance in the face of possible cyber-attacks launched by Russian proxies or Moscow itself.

Cyber security attacks are on the rise in schools. More technology means more potential threats. Unfortunately, some educators and students are unaware and unprepared for the repercussions posed by these cyber threats.

Due diligence is a process that confirms facts or details of something being purchased, or a contract for services. Due diligence examines all aspects of the deal to confirm that everything is as represented verbally and in writing by the offeror. It’s undertaken to prevent misrepresentations and to uncover potential fraud.

Data breaches, insider threats, loss of client trust—these are all security and privacy threats all organizations face today. Learn more about what action Privacy and Security Professionals are taking today. #PSR21

The Connecticut (CT) State Legislature has enacted major changes to CT Data Breach Notification Laws, effective October 1, 2021. These changes are a direct result of the worsening threat landscape, and it is safe to say that regulations will most likely continue to be enacted at both the state and federal levels.  

New call-to-action
New call-to-action

Subscribe to Cyber Threat Report