The US Securities and Exchange Commission’s aggressive new rules mark a profound regulatory shift in how businesses are now required to manage their cybersecurity risks.| CSO Online
The new SEC rules also require registrants to report ransomware payments within 24 hours to report ransomware payments and to submit annual cyber risk management, strategy, and governance reports.| CSO Online
Advanced planning, training and simulation, and understanding organizational risk will go a long way to avoid rookie mistakes when a cybersecurity team meets its first critical incident.| CSO Online
Used as an analyst assist application, generative AI can help threat intelligence programs in areas like data collection, analysis, and dissemination.| CSO Online
Accenture’s annual State of Cybersecurity Resilience finds while attacks are up, “Cyber Champions” have better security defenses against criminals| CSO Online
A tabletop exercise is an informal, discussion-based session in which a team or discusses their roles and responses during an emergency, walking through one or more example scenarios.| CSO Online
Tooling complexity and generative AI may harm many companies’ security posture.| CSO Online
Risk is an unavoidable consequence of doing business in the digital age. These six steps for creating a risk assessment plan can help anticipate the danger.| CSO Online
CISOs can anticipate and prepare for cyberattacks conducted by participants in geopolitical conflict such as the Israel/Hamas war by understanding the threat actors' motivations and goals.| CSO Online
The growing business use of emerging technologies such as artificial intelligence (AI) has made it more important than ever that business leaders understand how to manage their implementation effectively and securely.| Barracuda Networks
Experts weigh in on what the Colonial attack teaches critical infrastructure providers about preparation and incident response.| CSO Online
The CIA (confidentiality, integrity, availability) triad is a widely used information security model that can guide an organization’s efforts and policies aimed at keeping its data secure — but tradeoffs are necessary in real-world scenarios.| CSO Online
DORA introduces uniform and harmonised governing principles for the management of cyber risks. This means that the reporting on cyber incidents will be streamlined, and third-party risk supervised.| European Insurance and Occupational Pensions Authority
In a first-of-its-kind study, we spoke with 37 CEOs on how they manage cybersecurity risk. Here's what they said.| istari-global.com
Ransomware attackers broke records in 2023, pulling in over $1 billion from victims. Learn how and get the trends you need to know for 2024.| Chainalysis