Just when you could not wait to get through 2020 another big headache (perhaps “migraine” is more appropriate) hit the world, only this time in cyberspace. The cyber risk world was rocked recently with the news of a very sophisticated attack on SolarWinds, a much-used...
Data & Cybersecurity
Resolve to Prepare for Supply Chain Cyber Attacks with Better Vendor Risk Management Practices in 2021
Recent Attacks Highlight Importance of Proactive and Preventive Measures to Counter Intrusions Through Your Supply Chain The Recent State Attack On US Companies and Government Agencies In what has been called one of the most sophisticated cyber attacks in recent...
Work From Home (WFH) Work From Anywhere(WFA) practices: our thoughts about how to ameliorate the potential impacts From an HR Work From Anywhere (WFA) staffing standpoint new challenges have arisen that go far beyond meeting the typical onboarding controls....
This blogpost reviews Data Security and Privacy Trends as 2020 comes to an end. When COVID-19 triggered the move to working from home, many organizations sharpened their focus on reducing latency. They hustled to get the basics in place -- laptops, connectivity, etc....
In a recent report on the future of cybersecurity risks, The Wall Street Journal published a Top 10 list of systems and devices that hackers will attack in the coming decade. Santa Fe Group Senior Advisor Charlie Miller has been talking about most of these targets for...
As National Cybersecurity Awareness Month 2020 comes to a close, NCISA (the National Cybersecurity and Infrastructure Security Agency) has identified this final week’s focus to be “The Future of Connected Devices.” This theme brings to mind the Futurama Kitchen of...
Week three of Cybersecurity Awareness Month is themed “Securing Internet-Connected Devices in Healthcare.” (This is our second blogpost in a series of three for Cybersecurity Awareness October 2020 - our first post presented "Questions to Ask When Purchasing or...
October is Cybersecurity Awareness Month – in step with this first week’s focus on internet-connected devices and “empowering users to own their role in security by taking steps to reduce risks,” this blogpost examines what enterprise organizations need to understand...
Shared Assessments' Insurance Vertical Strategy Group came together for its quarterly meeting last week. Conversation was engaging and covered the widening scope of assessments, the multitude of third party types and the need for re-risking vendors in light of the...
We can tell you a lot more about going back to school for your PhD in Cybersecurity than we can about what back-to-school will look like for our own children this year. Let's explore risk management jobs from the cybersecurity perspective. Higher education...
- Big Data
- Cloud Computing
- Cyber Crime
- Cyber Insurance
- Cyber Risk
- Cyber Skills
- Data Breach
- Data Privacy Day
- Data Protection
- Identity Protection
- Information Security
- Internet of Things (IoT)
- Mobile Devices
- Software Security