A New Cybersecurity Partnership!

Announcing a New Partnership to Present a Year-long Series on Cybersecurity and Compliance

Screen Shot 2014-12-15 at 4.32.19 PM

The SMLR Group will partner with Raytheon Cyber Products and Jackson Lewis P.C. to host a series of informational cybersecurity webinars and seminars to be held throughout the coming year. These events will focus on all aspects of cybersecurity including Compliance,

Read more ›

Posted in Compliance, Cybersecurity, Encryption, Event Announcement, Heyman's Anomaly, HIPAA, Incident Response, Insider Threats, Legal, Privacy, Regulatory, Risk Management
Tags: , , , , , , , , , , , , ,

SMBs Are the “Target of Choice” for Hackers

Five Reasons Hackers are Targeting SMBs

by Steve Nice – 06/15/2017 – “Five Reasons Hackers are Targeting SMBs”

Larger organizations dominate the headlines when it comes to cybercrime, but it is the small and medium-sized business (SMBs) that are becoming the primary targets and are bearing the brunt of most attacks.

Read more ›

Posted in Cyberattack, Cybersecurity, Governance, Risk Management
Tags: , , , ,

The Myth of the SMB Being “Too Small to Bother With”

SMBs are NEVER ‘Too Small’ to be at Risk of Cyber Attacks

Read more ›

Posted in cyber risk, Cyberattack, Cybersecurity, defense intelligence, Hacks
Tags: , , ,

What Keeps Hospital CIOs & CISOs Up at Night

Hospital health data has been a clear target for hackers. They’re getting smarter, and education, and buy-in from the C-suite are key prevention strategies.

Read more ›

Posted in cybergovernance, Cybersecurity, Data Security, HIPAA, Vendor Compliance
Tags: , , , , , ,

Regulatory Compliance in the Cloud

Regulatory Compliance in Action and in the Cloud – Sharing Responsibility and Ensuring Compliance

Choosing to upload your data to the cloud is, for the most part, a moot point; the advantages of mobility,

Read more ›

Posted in Cloud, Compliance, Governance, Regulatory
Tags: , , , , ,

Cyber Risk Governance

The term “Cyber Risk Governance” is being used frequently. What is a good definition, and how does it differ from GRC?

by | Jan 23, 2017 | CYBERGOVERNANCE Journal – “Cyber Risk Governance is a Unique Discipline

Read more ›

Posted in Cyber Assessment, cyber risk, defense intelligence, Risk Management
Tags: , , , , ,

Achieving National Cyber Resilience

How do we as a nation enhance our cybersecurity posture to increase our resilience against cyberattacks targeting the homeland?

by | Jan 16, 2017  |  CYBERGOVERNANCE Journal – “Achieving National Cyber Resilience”

As the new administration forms,

Read more ›

Posted in cybergovernance, Cybersecurity, Regulatory
Tags: , , , ,

The Role of Cyber Due Diligence

Private Equity Firms Need Cyber Due Diligence

by | Nov 28, 2016 | “Private Equity Firms Need Cyber Due Diligence”

Verizon’s pending acquisition of Yahoo highlights a substantial risk faced by all private equity firms: how much cyber risk will the next transaction add to their portfolio?

Read more ›

Posted in Cyber Assessment, Data Security, Financials, Legal
Tags: , , , , , , , , ,

The First 100 Days – Trump and Cybersecurity

Cybergovernance: 3 Initiatives for the First 100 Days

by | Nov 14, 2016

A new administration’s priorities are often set within its first 100 days. What should the new administration do to help the country achieve greater levels of cyber maturity and risk mitigation?

Read more ›

Posted in Cyberattack, Cybersecurity, Encryption, Governance, Legal, Privacy, ransomware, Regulatory, Risk Management
Tags: , , , , , , , , , , ,

Cyber Risk and D&O

How Will Cyber Risk Evolve D&O?

by | Oct 24, 2016 | Cybernance – Cybergovernance Journal “How Will Cyber Risk Evolve D&O”

“Prudent board candidates have long demanded that directors’ and officers’ insurance be in place before accepting a board seat,

Read more ›

Posted in cyber risk, Cyber-Insurance, cybergovernance, Risk Management
Tags: , , , ,

Spear-Phishing Attacks: Why They Are Successful and How to Stop Them

White Paper: Spear-Phishing Attacks

Some of the most notorious cyber crimes in recent history — such as the attacks on major banks, media companies and even security firms — started with just one person clicking on a spear-phishing email.

Spear phishing is on the rise because it works.

Read more ›

Posted in Cybersecurity, Malware & Other Threats, Phishing, Risk Management
Tags: , , , , , ,

Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Google Plus

Keep Current with What’s New in Cybersecurity

Email Address:

Name:


Cybersecurity News Daily

Provides a daily summary of what's news in Cybersecurity

Archives

Recent Tweets

Categories

Follow

Get every new post delivered to your Inbox

Join other followers: