Preparedness, planning, and strategies for execution
We recently released the latest edition of our Data Breach Response Guide, a resource we’re proud to offer to business leaders to help them...
Everyone knows that the 90 percent of the iceberg below water, the part you can’t see, is the portion that can rip through the...
For the second time in less than a year, the United Kingdom’s data security regulator has fined one of the nation’s largest telecom companies...
Companies around the world, of every size and in every industry, are engaging in digital transformation, as they seek to leverage technology to enhance...
As if ransomware attacks weren’t diabolical enough, a new wrinkle may be emerging — hiding something even worse behind the ransomware assault. The recent...
When companies merge, acquire or are acquired, they’re exposed to a variety of threats during the transaction period, including ones that could potentially terminate...
Does the c-suite give enough attention to cybersecurity? Multiple studies suggest many executives aren’t as engaged as they should be when ensuring their organizations...
New cyber risks emerge daily, and companies can find it challenging to maintain protections against known threats while also adjusting their response plans to...
Most companies aren’t prepared to respond to a global data breach, and aren’t yet ready to comply with the European Union’s General Data Protection...
Risk managers, legal experts and brokers say phishing and social engineering are, by far, the biggest security threats facing their companies and clients. In...
Your company may have a response plan in place to handle cybersecurity breaches. You may have had professional help in putting your plan together...
World Password Day just passed, and we have to ask — are passwords passé yet? Earlier this year, in our fourth annual Data Breach...