Supply Chain Risk is more pertinent now that digital transformation initiatives are the norm. In a recent Ponemon study, 82% of respondents believe their organization experienced at least one data breach due to digital transformation. At the same time, 55% said with certainty that at least one of the three breaches was caused by a third party. Reporting on SCRM and gaining visibility into the cyber risk across third parties is critical to the security of both small and large organizations, especially in the digital age we live in.
Meet Max Vetter, Chief Cyber Officer of Immersive Labs. Before joining Immersive Labs, Vetter spent seven years working with the Metropolitan Police Service as a police officer, intelligence analyst, and covert internet investigator. After leaving his career in law enforcement, he trained the private sector and government agencies in ethical hacking and open source intelligence, specializing in darknets and cryptocurrencies. This included three years of teaching at the GCHQ Cyber Summer School. Here, we speak to Vetter about emerging threats in the cybersecurity space and general security trends he has been noticing throughout the industry.
OpenText acquired Carbonite and Webroot in December 2019, helping expand the company’s cyber resilience portfolio and strengthening its comprehensive information management offering. As it happens, the acquisition could not have come at better time. By the end of March 2020, 98% of OpenText’s global workforce of more than 14,000 had pivoted to remote work due to COVID-19. OpenText, like so many others, had to adapt to the new normal and find a way to protect the data and devices that were now well beyond the company network and firewall.
Data breach and privacy incidents occur daily at organizations of all sizes. It happens all too frequently. And while it is obvious that breaches continue impacting hundreds of thousands of lives, legal and compliance teams are not always brought in to manage each breach. With increased focus from regulators and law enforcement agencies to ensure organizations fulfill their obligations for post-breach notifications, legal teams can help quickly coordinate internal processes, and take swift action to begin the process of remediating damage and initiate immediate legal steps to protect the enterprise, and comply fully with all regulatory obligations. Here, we talk to AJ Samuel, co-Founder and Chief Product Officer at Exterro, about the many benefits of retaining legal counsel, who can better protect the integrity and confidentiality of the incident response.
Many companies are struggling to adapt their security strategy to accommodate the new normal. With remote working now an ongoing reality, there has been a rush to adopt and integrate a slew of new tools and cloud platforms to facilitate collaboration and maintain productivity. However, in the race to connect everyone, security implications are often overlooked. This, coupled with the fact that relying solely on a corporate firewall is no longer a sound security strategy, puts many organizations at risk.
So, what should companies do now to adjust their security strategy? Here are five factors to adhere to that will prevent cybercriminals from taking advantage of the virtual business environment.
Tracy Hill is promoted to Director of Security at SGMC. Hill has been with SGMC since 2005, and has worked within the security field for over 25 years.
Once it is safe to do so, will employees return to the office full-time or will companies opt for hybrid scenarios in which some time is still spent working from home? And how will organizations be able to make informed decisions that are safe for their employees and respect their bottom line?
Technological innovations representing new, advanced solutions to a previously unforeseen problem. Advancements that, even once the pandemic is finally dealt with, will continue to change not only their respective industries but also the world. The fields in which such innovation is most prevalent are, not surprisingly, healthcare and the public sector. Here are just a few ways in which this has manifested.
In the run-up to Prince Harry and Meghan Markle's much-anticipated royal wedding, the local Thames Valley Police (TVP) force knew that it had to make this high-profile event as secure as possible. The same security level would have to be maintained for Princess Eugene and Jack Brooksbank's royal wedding five months later, located at Windsor Castle. The police knew that both events would carry significant risk to the attendees and the general public without full security measures. Therefore, the police had to ensure that threats would be identified as soon as possible, before, after, and during the events. In fact, it was estimated that the security operation cost was in excess of $41,701,500, or £30 million, becoming one of the biggest UK operations ever.
Kaspersky recently conducted a study based on anonymized OS metadata provided by consenting Kaspersky Security Network users. The survey found that almost one quarter (22%) of PC users are still using the end-of-life OS Windows 7, which stopped receiving mainstream support in January 2020 by way of the vendor no longer sending software updates including critical security fixes.