BlueVoyant's Cyber Defense Platform combines proactive and reactive security measures with internal and external capabilities. CEO Jim Rosenthal explains how this comprehensive approach allows clients to manage cyber risks effectively and achieve a desired state of cyber defense readiness.
Small and medium-sized businesses are vulnerable to cyberthreats, often due to insufficient investment in security measures. Joe Levy, CEO of Sophos, shares insights on enhancing SMB cybersecurity outcomes, with a focus on combating ransomware and protecting vital supply chains.
Staying ahead of cyber threats requires more than just reactive measures—it demands a proactive approach informed by reliable data and robust analysis.
As economic pressures mount, CISOs face increasing demands to optimize their cybersecurity budgets while maintaining robust defenses. This webinar delves into strategies for maximizing security investments and the benefits of technology consolidation. Learn how to navigate budget scrutiny and leverage a unified...
A supply chain security firm led by an ex-Google Cloud engineer closed a Series C round to assist AI workloads and expand its open-source software catalog. Chainguard raised $140 million just eight months after completing a $61 million Series B funding round, tripling its valuation to $1.12 billion.
When vendors or contractors don't deliver, the impact can be devastating and long-lasting without a proper third-party risk management program in place. See the path to managing third-party risk effectively with a checklist that outlines the six steps for a sound TPRM program.
Download this whitepaper to learn how...
Third parties present risks that can have significant negative impacts on your organization, including data breaches, reputational damage, regulatory violations, and financial losses. Assessing and monitoring these risks is complex, time consuming, and resource intensive, often leaving you with significant gaps in...
Working with third parties introduces new business risks, making it crucial to design a third-party risk management (TPRM) program that enables privacy compliance. What steps can you take to build a TPRM program that aligns with your privacy goals?
Download this checklist for help with:
Understanding what to...
It's been nearly 18 months since ChatGPT paved the way for rapid generative AI adoption, but enterprises are just beginning to implement basic cybersecurity strategies and use blocking controls, DLP tools and live coaching to mitigate gen AI risks, according to security firm Netskope.
A judge Thursday dismissed most of the claims federal regulators made against SolarWinds related to allegedly misleading investors about the company's cybersecurity practices and risks. The SEC can proceed only with claims related to the security statement issued by SolarWinds before the 2020 hack.
Healthcare groups should consider several key points about a recent Texas federal court ruling and its impact on the use of online tracker technology on the healthcare websites of HIPAA-regulated organizations, said privacy attorney Iliana Peters of the law firm Polsinelli.
What will it take for victims of ransomware, extortion and other types of cybercrime to stop directly funding their attackers? The latest breached business to pay a ransom to its attackers appears to be AT&T, which reportedly paid Shiny Hunters over $350,000 for a promise to delete stolen data.
Hacks and vendor incidents continue to dominate major health data breach trends in 2024, but a handful of large incidents involving "unauthorized access or disclosure" also top the list of major health data breaches reported to federal regulators so far this year. How are trends shifting?
CISOs Shefali Mookencherry and Kenneth Townsend examine the implications of AI for copyright infringement and consent. They discuss the need for clear governance and responsible use of data and the evolving landscape of AI privacy issues in both the healthcare and non-healthcare sectors.
The U.S. Cybersecurity and Infrastructure Security Agency provided details on Monday about a framework it's currently developing to measure and evaluate the trustworthiness of open-source software security, including funding a new open-source tool to make the framework scalable and implementable.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.