IoT cloud

Third Party IoT Security: Interpreting Survey Results in the Context of a Shifting Security Paradigm

June 15, 2017 | Cyberattacks, Data & Cybersecurity, Data Protection, Internet of Things (IoT), Third Party Risk Management, Vendor Risk Management, Vendor Security

Shared Assessment’s just published Ponemon research report The Internet of Things (IoT): A new Era of Third Party Risk provides a great snapshot of current IoT Risk management both within an organization’s four walls and with the third parties that so often support mission critical activities. ....

bigstock Woman doctor using tablet comp 79388257

The Evolving Threat Landscape and New Challenges for Healthcare Security

June 7, 2017 | Cyberattacks, Cybersecurity, Data & Cybersecurity, Healthcare, Industry Verticals

  In this series, Shared Assessments Advisory Board Committee member Ken Peterson talks about managing cyber risk in the Healthcare space. We look forward to hearing more on this topic from Ken and the NH-ISAC at the 10th Annual Shared Assessments Summit. Q&A Series – Part 1As a sea ....

Shared Assessments Program Addresses Recommendations of Russian Hack Report for Improved Security

January 13, 2017 | Cyber Crime, Cyberattacks, Cybersecurity, Data & Cybersecurity, Hacking, Program Tools, Security, Third Party Risk Management, Tools & Templates

The Threat Horizon The December 29th joint analysis report (JAR) GRIZZLY STEPPE – Russian Malicious Cyber Activity, contains specific indicators of cyberattacks and steps organizations can take to mitigate the “the tools and infrastructure used by the Russian civilian and military intelligence S ....

At the Heart of the Cyber Security Skills Shortage

September 7, 2016 | Cyberattacks, Cybersecurity, Data & Cybersecurity, Hacking

Three recent studies demonstrate that organizational and IT department leadership sit squarely at odds with several important challenges to improving IT-related risk postures: Predictions that organizations do not plan to increase the level on hand security expertise; A well-documented and loomin ....

APTs: The Newer, Smarter, and Actually Successful Wile E. CoyoteAPT tools and methodologies

January 15, 2016 | Cyber Crime, Cyber Risk, Cyberattacks, Cybersecurity, Data & Cybersecurity, Tools & Templates

Remember the old Looney Tunes cartoons where Wile E. Coyote nearly destroys himself in attempt after fruitless attempt to capture the Road Runner? The Road Runner seems to have a sixth sense when a trap is sprung across his path and always escapes unscathed. Well, when it comes to cyber attacks, ....

« Previous Page