Talking to children about online safety.

Online Safety For Children

by Marisa Sgambati | June 8, 2022 | Cyber Risk, Cybersecurity, Data & Cybersecurity, Data Protection

Technology is all around us. Smartphones, smart watches, cars, computers, refrigerators, and cameras have become an enormous part of our everyday lives. These introductions have challenged us to constantly adapt. We are living in (and raising families in) an evolving technological society. As a p ....

Everyday Behaviors and Cyber Risk

Everyday Behaviors and Cyber Risk

by Ron Bradley | April 18, 2022 | Cyber Risk, Data & Cybersecurity

The human element is considered the weakest element in the security “onion.” How do we understand what our users may or may not be doing to create some level of risk to our cyber environments? Organizations need a way to detect anomalies that arise intentionally or unintentionally. I recently ....

Trends in Ransomware What to Know About RaaS

Trends in Ransomware: What to Know About RaaS

by Kristen Hicks | April 8, 2022 | Cyber Crime, Cyber Risk, Data & Cybersecurity

By now we’ve all heard of SaaS (software as a service) and many have heard of IaaS (Infrastructure as a Service), PaaS (Platform as a Service), or the term that contains them all: XaaS (anything as a service). The as-a-Service business model, which usually has customers paying a subscription rate ....

Ransomware Risk

Collected Thoughts: Ransomware Risk

by Charlie Miller | July 30, 2021 | Cyber Risk, Cybersecurity, Data & Cybersecurity, Data Breach

This month, several Shared Assessments Industry Strategy and Working Groups came together in a cross vertical meeting, Ransomware: It Takes An Organization, to address ransomware threats.   Sophisticated ransomware attacks are being used with adjusted methods to strike supply chains and m ....

Third Party 5G Risks & The Power of ‘And’

by Charlie Miller | June 14, 2020 | Cyber Risk, Cybersecurity, Data, Data & Cybersecurity

Sharp leaders deploy it, improv performers embrace it and fifth generation (5G) wireless technology depends on it. I’m referring to the power of “and.”   Skim through any thought leadership concerning 5G’s massive potential to generate new business models and related benefits -- remot ....

qtq80 n1EiEn

Fear, Uncertainty and Doubt May Be Clouding Cyber Insurance and ERM-Cybersecurity Integration

November 15, 2018 | Cyber Insurance, Cyber Risk, Data & Cybersecurity

As cybersecurity programs become more integrated into enterprise risk management (ERM) programs, security professionals grapple with new issues. Rather than relying on fear, uncertainty and doubt (FUD) to fuel their business case for budget increases, cybersecurity leaders are striving to quantify t ....

Next Page »