Blog
Page 68 of 152
5 Things Keeping You From Risk Management Utopia
There are a lot of buzzwords and hot topics in the cyber security industry but there’s one thing we GRC professionals can not agree upon … risk assessments. Some people start with a pre-built risk register while others start by conducting internal surveys. Some re-assess risk annually, some use mathematical equations and some still use […]
May 10, 2022
Reciprocity Community Edition Best Practices: How to Get Started with the Reciprocity ROAR Platform
The Reciprocity® Community Edition is now available and is your chance to see the new Reciprocity ROAR Platform in action and it…is…totally…free! This is a great opportunity for you to not only get an instance of the ROAR Platform but also to see how the Reciprocity Community can provide you with meaningful content and connections […]
May 3, 2022
5 Essential Steps for Third-Party Risk Management Success
In a world full of security breaches and litigation, every organization needs a solid strategy to identify and reduce risks relating to the use of third parties, e.g., vendors, suppliers, partners, contractors, or other service providers. These risks — which can include financial, environmental, reputational, and security risks — exist because these types of companies […]
May 2, 2022
Your Guide to Defense in Depth
Modern cybersecurity requires a multi-layered approach to detecting and repelling threats. Emerging cyber risks can adapt to your initial firewalls or encryptions, so having more than one layer of defense helps to thwart these bad players. This type of cybersecurity strategy is called Defense in Depth. In this guide we’ll walk you through everything you […]
April 26, 2022
How to Achieve Network Infrastructure Modernization
Most businesses today want to deliver modern applications, products, and services to customers as efficiently as possible. This seemingly simple goal is far more complex than it sounds – particularly in the age of digital transformation. Many organizations have already had to face decisions about modernizing policies, processes, and technology, such as choosing to migrate […]
Operational Risk Management: Benefits and Common Challenges
Operational risk is defined as the risk of a loss that results from inadequate or failed business processes, people and systems, or from external events. More simply, operational risk pertains to any uncertainty or threat your organization faces (or might face in the future) during day-to-day business activities. The risk arises from operational disruptions and […]
The Industrial Internet of Things and Cybersecurity
Learn how the industrial internet of things (IIoT) is changing industries around the world, and what your business can do to make sure your IIoT devices are secure. The fourth industrial revolution – industry 4.0, as some are calling it – is upon us. As digital transformation sweeps across manufacturing, production and related industries, many […]
Does Your Cyber Threat Intelligence Team Know These Key Things?
The 2021 CrowdStrike Global Security Attitude Survey found that on average, organizations take 146 hours to discover a cybersecurity incursion, an alarming increase on the 2020 average of 117 hours. This means that an intruder could remain inside an enterprise network for more than six days before detection. Moreover, those attackers can move laterally across […]
The Importance of HECVAT (Higher Education Community Vendor Assessment Toolkit)
For organizations in higher education – from academic institutions to their third-party service providers – the Higher Education Community Vendor Assessment Toolkit (HECVAT) is not new. As data protection and cybersecurity become increasingly critical for organizations across industries, HECVAT has perhaps never been more important than it is today. Why? Because higher ed institutions (like […]
April 19, 2022
Point of Sale Security: What It Is & How to Keep Your Business Safe
POS security is the security for a point-of-sale (POS) payment system – that is, the system that businesses use to accept, process, and record payment transactions between the business and the customer. “Point-of-sale” describes the appliances and software that process transactions: everything from tap-and-go credit card readers to old-fashioned cash registers, as well as the […]
Page 68 of 152