Blog
Page 64 of 152
Get a Head Start on Your PCI DSS v4.0 Overhaul
“The big news with version 4 of the Data Security Standard is that this is a major release and some significant changes have occurred.” – Mark Bayerkoler, PCI Security Council Key takeaways You have time! Get familiar with PCI DSS v4.0 to be ready March 31, 2024: PCI DSS v3.2.1 retired March 31, 2025: PCI […]
June 28, 2022
Reciprocity Continues Strong Company Momentum in H1 2022
SAN FRANCISCO, CA – June 28, 2022 – Reciprocity, a leader in information security risk and compliance, today announced its continued company momentum as recognition – and demand – grow for the company’s pioneering approach to cyber risk management that ties an organization’s risk directly to its business strategy. Industry Recognition Reciprocity ZenGRC® platform continues […]
Security threats are evolving – so why isn’t your security program?
While the cybersecurity environment is becoming increasingly threatening and complex, security programs are finding it difficult to keep up. Even as budgets increase, CIOs, CISOs, and other IT executives concerned with security feel underfunded, understaffed, and unsupported. But organizations that are taking the lead in risk management are garnering results. How well does your organization […]
June 24, 2022
10 Common Types of Phishing Attacks and How to Identify Them
Although scammers have been around for far longer than the internet, the advent of cyberspace has presented crafty criminals with a unique set of opportunities to take advantage of technology users. These attempts to trick users into giving cybercriminals what they want are called phishing attacks, and they’re on the rise. Phishing attacks are a […]
Top 5 Best Internal Controls for Cyber Risk Mitigation
Risk has always been an inevitable part of doing business. How organizations identify, manage and mitigate those risks ultimately determine whether or not they will survive after a disruption. To help your organization better prepare for and respond to risks when they occur, you’ll need a comprehensive risk management program. At the core of your […]
June 23, 2022
How Deep Learning Can Be Used for Malware Detection
Malware is a threat for businesses everywhere. Short for “malicious software,” malware is any intrusive program that exploits system vulnerabilities to wreak havoc on a computing system. You need robust malware detection tools to prevent this from happening to your business. Even the best malware detection methods can fall short, however, because malware is constantly […]
Insider Threat Examples: 7 Real-Life Cases to Guide Your Cybersecurity Program
In today’s digital age, organizations know the importance of preparing for cyber attacks and data breaches. Too many, however, focus only on outside cybersecurity threats, even though insider threats are very common. In fact, according to one Ponemon Institute survey, the number of insider incidents spiked by 47 percent from 2018 to 2020. The total […]
Prepare for PCI DSS v4 NOW to Stay Ahead of Bad Actors
EXPERT TIPS TO PREPARE FOR THE TRANSITION AND MAKE THE MOST OF NEWFOUND FLEXIBILITY AND CONTROL “The big news with version 4 of the Data Security Standard is that this is a major release and some significant changes have occurred.” – Mark Bayerkoler, PCI Security Council Are you prepared? Because PCI DSS v4 is stepping […]
June 22, 2022
Cybersecurity Risks in Supply Chain Management
As the world becomes more interconnected, organizations increasingly rely on extended supply chains to conduct business. For many, however managing the supply chain and the risks associated with it is a time-consuming, expensive process. In many cases, organizations that don’t adequately manage their supply chain risks are more likely to fall victim to a cyberattack […]
What is Operational Security & Why is it Important?
Protecting your organization against security incidents is easy enough in theory, but many businesses struggle to find the right approach when it comes to their cybersecurity. As the digital transformation takes hold of the modern business environment, implementing safeguards to your organization’s critical information is only going to become more critical for survival-and if you […]
June 16, 2022
Page 64 of 152