In the current environment, it is wise to incorporate security into your software development lifecycle as early as possible. Historically, security checks were a pre-release gateway for a software team: if you passed, your product/service could go to production. At the same time, security checks used to require a code and environment freeze, while audit preparations led to chaos and a non-systematic approach in collecting important security documentation. All these elements led to a bottleneck for the project team. However, a long wait for security testing results is no longer an option since the typical project pace has significantly increased. Various project models suggest their own approaches for introducing security into software development.
Today, it seems like every few weeks, a new content provider launches an exclusive way to access entertainment. In the last year alone, we saw the introduction of Disney+, Peacock, HBO Max, and others. This is good news for consumers who want exclusive access to content, good news for broadcasters who can charge a premium for access, and especially good news for hackers. Yep, hackers. Streaming services are an enticing target for cybercriminals who use malicious bots to grab your customer’s account information and then sell or even use it themselves to access other services.
Transportation Security Administration (TSA) law enforcement and police departments from Connecticut, and New York recently partnered with the Connecticut State Police (CSP) to assess their ability to hunt and stop unauthorized drones from interfering with commercial aviation.
The SolarWinds hack is a strong reminder why third-party risk management is so important. Not only was SolarWinds breached, but the hack is now believed to have affected upward of 250 federal agencies and businesses. Here, we speak to Jonathan Ehret, Vice President of Strategy & Risk at RiskRecon, who believes organizations should be asking their vendors about the third-party risk management and cybersecurity policies they have in place to protect against a breach and leak of critical data.
This past year has been a challenging one for many business owners and employees who’ve been forced to leave the office environment and switch to working from home (WFH) full time. Whilst this undoubtedly has its benefits, the risk of data breaches has exponentially grown. With that in mind, the Digital Marketing experts at Reboot Online surveyed 1,198 business owners and employees across the UK on their experiences with data breaches and password security in the past year (2020/2021). Key findings include:
These are the terrible uncertainties and costs organizations like yours face as ransomware rages around the cybersphere. As you deliberate on the best strategy and tactics for defending your organization from ransomware, understand that the total cost of recovering from such an attack more than outweighs the cost of being prepared to defend against it.
Though filling the cybersecurity talent pipeline has often been thought of as a longer-term goal for the United States, there is renewed urgency to address the tremendous workforce shortage – and quickly. Recent cyberattacks on U.S. infrastructure continue to serve as warning signs that the cadence of threats has increased tremendously and requires immediate action by both industry and government partners. Solving the cybersecurity workforce and talent shortage requires taking action, starting with the youngest learners in the K-12 educational system.
Expert in security advisory services, program design and the application of technology to risk management, Lianne Kennedy-Boudali joins Control Risks’ Crisis and Security Consulting department in the Americas as a Principal.
Backblaze, Inc., a storage cloud company, appointed Mark Potter as Chief Information Security Officer as the company continues to bolster its leadership team to drive growth.