The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. In it, respondents say their organizations continue to connect new and different types of endpoints, including point-of-sale (POS) devices, printers,...
Infirmary Health System is the largest non-government healthcare team in Alabama, treating more than 100,000 patients annually. The organization deployed a security solution to qualify for meaningful use dollars and reduced security incidents significantly.
Download this case study and learn:
Why Infirmary Health...
In recent years, highly publicized data breaches have elevated the need for vendor risk management. In this year's Verizon DBIR report, 70% of incidents observed involved a secondary victim where the victims were targeted and infected through an unknowing third party, like a vendor.
Yet despite the alarming number...
As organizations today rely more and more on outsourcing, companies have become increasingly hyper connected. With this change comes greater vulnerability, which is passed along to you as the insurer.
However, if you use the right technology, you can identify this increased risk so you can write policies more...
Benchmarking security performance against peers and industry averages is one way organizations can get a true picture of just how secure they are.
Download this report to learn:
Why optimism bias is harmful to an enterprise risk management strategy
How to help identify security issues that traditional audits may...
Evaluate your cybersecurity policies and controls to lower your cyber risk.
Download this whitepaper that presents how organizations can reduce their cyber risk by embracing responsible cybersecurity practices throughout their networks. It features an analysis of the cybersecurity posture of organizations of all...
Your company shares sensitive information with a number of organizations every day. And that means your security team has to find a way to keep this data secure as it filters through your company's ecosystem of partners, suppliers, vendors, resellers, and more.
Download this whitepaper that explains:
What types...
As targeted cyber security threats have continued to grow, IT professionals have become increasingly aware of their third-party partnerships. During the alignment between their business objectives and business contracts, many organizations are discovering a great need for automated, data-driven monitoring...
Traditional approaches to managing cyber risk typically include use risk assessment questionnaires and audits. The results of these are often interpreted with cyber threat matrices to provide a rough, qualitative snapshot of risk. Such strategies are time consuming, expensive, and it is unclear how effective they are....
In order to manage cyber risk for your company, you need the ability to understand your security performance, and then take action to strengthen it.
Download this whitepaper to learn:
Comparisons of network security risk against your peers, competitors, and partners
Identify cyber threats before they turn into...
Mergers and acquisitions (M&A) are commonplace in the business world. Unfortunately, so is cyber crime. According to a recent study, 78% of respondents said that cybersecurity is not analyzed or quantified in depth as part of their M&A due diligence process. If you are evaluating a new M&A, why would you neglect...
Despite a staggering rise in the exposures faced by global businesses from cyber attack, data theft or privacy violations, the insurance industry remains well capitalized and willing to supply substantial cover to organizations in the form of cyber insurance.
Download this whitepaper to learn about the unique...
In today's world of security breaches and cyber crimes, insurance buyers are seeking better protection. While general insurance companies are looking to exclude cyber risk coverage, the stand-alone cyber insurance market is growing and maturing rapidly.
Download this whitepaper that will explain:
Why harnessing...
As information security threats intensify, organizations' risk management tasks are becoming disoriented - focused more on grappling with complex technology, an explosion of data, increased regulation and a debilitating skills shortage. This is a huge danger, because prompt action is required to interpret an...
The chairman of the U.S. Securities and Exchange Commission will face the Senate Banking Committee next week following the agency's belated disclosure that in May 2016, hackers stole secret market data from the SEC's systems and apparently used it for "illicit gain through trading."
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.