All Cybersecurity articles
-
Webinar
2023 Cybersecurity Trends: Escalating Human Error Risks
Webinar produced by GRC World Forums in association with SoSafe
-
Feature
Automate and Educate at scale: Two key focuses when it comes to Vendor Risk Management
According to KPMG, 73% of organisations have experienced at least one significant disruption from a third-party cyber incident within the last three years. And with breaches involving third parties costing businesses more than $4.29 million on average - investment in vendor risk frameworks is increasing at a rapid rate.
-
Feature
Cyber Security, is it a core part of your ESG?
Let’s take a look at why cyber security is a core part of ESG.
-
Feature
Elevate your cybersecurity with C2 Risk
Technology plays an integral role in both personal and professional aspects of our lives but the importance of robust cybersecurity cannot be overstated. With threats looming everyday, the C-Suite and organisations alike need to be proactive in securing their digital defences to protect themselves against potential risks posed by third-party suppliers.
-
Webinar
Cybersecurity Threats: Know The Risks Your Third Parties Pose to Your Business and How to Defend Against Them
In 2021 alone there was a 62% global attack spike in ransomware, and it was made clear that the cyber threats are becoming not just more common, but also more sophisticated.
-
Webinar
After the attack: Mitigating Organisational Impact of a Data Breach? (LATAM region)
After the attack: Mitigating Organisational Impact of a Data Breach?
-
News
Cyber Security Hub @ #RISK
#RISK – Europe’s Leading Risk-Focused Expo: November 16 & 17, ExCeL, London
-
Webinar
After the attack: There’s No Place for Guesswork in Cyber Attack Investigations (South Asia Edition)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
Webinar
After the attack: Mitigating Organisational Impact of a Data Breach (Central & East Europe Region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
Webinar
After the attack: There’s No Place for Guesswork in Cyber Attack Investigations (Nordic Benelux region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”
-
Feature
Key Tactics for Effective Cybersecurity
As the pandemic pushed millions of workers home, corporations rushed to build infrastructure to support their new remote workforce.
-
Webinar
After the attack: There’s No Place for Guesswork in Cyber Attack Investigations (South Europe region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
Webinar
After the attack: Mitigating Organisational Impact of a Data Breach (DACH region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
ebook
Executive Summary: ICS/OT Cybersecurity Year In Review 2021
Get what you need to know quickly to protect your critical assets by reading the Executive Summary of the 2021 ICS/OT Year in Review.
-
Video
The Role of Cybersecurity in Enterprise Risk Management (ERM)
This session takes a look at how, integrated risk management has become a popular process for managing the risks facing an organisation, and is the new method of choice for business leaders and security managers alike.
-
Webinar
2022 Trend Watch: Realizing the Full Potential of SASE and Zero Trust
The events of 2021 have created a paradigm shift in cybersecurity. The steady cadence of large-scale cyber attacks have accelerated a move away from perimeter-focused security to Zero Trust. While core foundations of Zero Trust have been implemented, many tech leaders are still missing a critical piece of the puzzle for safeguarding their data.
-
News
Dutch police gives final warning to DDoS booter customers
More than a dozen customers of a distributed denial-of-service (DDoS) website received a final warning from Dutch authorities, informing them that future cyber violations will result in prosecution.
-
News
Google announces cybersecurity action team
Google is bringing together a group of experts to deliver strategic advisory services, trust and compliance support, customer and solutions engineering and incident response capabilities.
-
News
Research reveals rise in supply chain cybersecurity breaches
Vendor risk visibility and continuous third-party monitoring remains concerningly low despite heightened awareness of the risk and substantial budget increases to tackle the problem
-
News
US government to sue contractors who don’t report a breach
The US Department of Justice has announced that under the new Civil Cyber-Fraud Initiative, government contractors will be held accountable in civil court if they don’t report a breach.