Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
    • Security Blog
    • Newsletter
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » cyber risk mitigation

Articles Tagged with ''cyber risk mitigation''

Patch, System Update

Patches? We Don’t Need No Stinkin’ Patches!

Jon Heimerl
July 6, 2017
If an organization knows software patches have not been applied and takes no action to remedy the situation, they could be considered negligent and held liable, and suffer significant financial and public relations consequences.
Read More
Is Cybersecurity Part of Your Customer Service Policy?

Is Cybersecurity Part of Your Customer Service Policy?

For ABC Fine Wine & Spirits in Florida, the path to data breach preparedness began with the realization that great customer service extends to customers’ data.
Claire Meyer
June 1, 2017

If a data breach can happen to Home Depot and Target, it can happen to us,” says Lee Bailey, Director of IT Security and Operations for ABC Fine Wine & Spirits, a mid-sized business in Florida with 140 locations and around 1,000 employees.


Read More
cyber 3 responsive default

77% of Ransomware Detected in Four Industries

June 1, 2017

A new report reveals that 77% of all detected ransomware globally was in four main sectors.


Read More
whistleblower-cyber

Blowing the Whistle as a Cybersecurity Professional

Matthew LaGarde
Matthew LaGarde
Alexis Ronickher
Alexis Ronickher
May 31, 2017
Cybersecurity is a fact of business life, but employers are not always pleased when a cybersecurity professional reports a serious and expensive cyber deficiency. Often, instead of addressing the problem, they shoot the messenger and retaliate against the whistleblower.
Read More
hacker

5 Reasons to Focus on Malware Delivery Mechanisms

Chris Olson
May 31, 2017
According to Symantec’s Monthly Threat report, the number of web attacks almost doubled in April of this year alone, up from 584,000 per day to 1,038,000 per day.
Read More
cyber matrix

5 Signs You Could Use an MSSP

Christopher Ensey
May 31, 2017
As cyber threats have evolved, so too has incident management, from handling it in-house to hiring consultants to engaging Managed Service Providers (MSPs).
Read More
ransomware

Ransomware Outbreak Underscores the Need for Increasingly Essential Cybersecurity Practices

Alexander Garcia-Tobar
May 31, 2017
The ransomware crisis that swept the world last month highlights what we’ve known for years: The global IT infrastructure is incredibly vulnerable.
Read More
cyber7-900px.jpg

More Budget is Spent on Property Related Risks vs. Cyber Risk

April 25, 2017

Organizations now believe that their cyber assets are more valuable than plant, property and equipment assets, even though they are spending four times more budget on insurance protecting cyber risks.


Read More
Whistleblower Word Cloud

It's Time to Embrace Cybersecurity Whistleblowers

Matthew LaGarde
Matthew LaGarde
Alexis Ronickher
Alexis Ronickher
April 6, 2017

Ignoring cybersecurity whistleblowers or, even worse, subjecting them to retaliation will not fix data security problems. Instead, it will only result in increasing an organization's legal exposure and driving cybersecurity whistleblowers to report externally.


Read More
How to Evaluate Your Security System's Cyber Risk

How to Evaluate Your Security System's Cyber Risk

Between security systems manufacturers, integrators and end users, is anyone fully prepared to mitigate cybersecurity risk?
April 1, 2017

Whether it’s an HVAC system, a point-of-sale terminal or a video surveillance camera, malicious attackers are looking for any way into your network and closer to your valuable data, systems and intellectual property.


Read More
Previous 1 2 3 4 5 6 7 8 9 10 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service
  • eMagazine Subscriptions
  • Manage My Preferences

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • doctor with cellphone.jpg
    Sponsored byAxis

    How remote patient monitoring safeguards patient care and optimizes workflows

Popular Stories

SEC Top Cybersecurity Trends of 2023 header

Top cybersecurity trends of 2023

digital fingerprint

Digital fatigue is increasing cyber risks in modern workplaces

tower of surveillance cameras

The evolution of AI and physical security

ChatGPT on computer

Security leaders discuss ChatGPT DDoS attack

QR code on phone

New report shows 51% rise in QR code phishing for September

SEC AuditBoard webinar

Events

June 29, 2023

From Crisis Response to Proactive Defense: Shifting the Paradigm of Threat Intelligence

In today's rapidly evolving security landscape, organizations face an ever-growing array of disruptive events, security threats and risks. Traditional reactive approaches to security intelligence often leave businesses vulnerable and ill-prepared to anticipate and mitigate emerging threats that could impact the safety of their people, facilities or operations.

October 18, 2023

How to Enhance Corporate Investigations for Mac Computer Forensics

ON DEMAND: Apple Mac computer use is growing in the corporate space. Having the solutions and the knowledge base to respond to events that include Mac computers is just as important as their Windows counterparts.

View All Submit An Event

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
LinkedIn

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY
    • UPDATE MY PREFERENCES
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing