Home Search

cybersecurity - search results

If you're not happy with the results, please do another search
audio

Greg Garcia on Healthcare Cybersecurity Risk [Podcast]

By Adam Turteltaub At the center of managing cyber risk in healthcare sits the Health Sector Coordinating Council Cybersecurity Working Group (LinkedIn). In this podcast,...
audio

Matt Kelly on Cybersecurity and Suppliers [Podcast]

Post By: Adam Turteltaub Matt Kelly, Editor & CEO of Radical Compliance makes a strong case in this podcast for a need to reassess cyber...

Startup AI Raises New Controversy in Cybersecurity

Post By: David Lukić While AI has humble roots in the Turing machine which provided the blueprint for modern-day computers, it has certainly evolved since...

7 Most Common Cybersecurity Mistakes To Avoid

Post By: Freddie Tubbs, Business Analyst, Academized Most website owners pay close attention to various factors affecting their website`s popularity and conversions but leave little...

Giving Cybersecurity the “Cassandra Treatment”

By Jonathan Rusch Principal, DTG Risk & Compliance LLC In Greek mythology, the god Apollo gave Cassandra, the daughter of King Priam of Troy, the gift...

Reaching Across Siloes: Compliance and Cybersecurity in Partnership

  Adam Shnider Vice President, Delivery, Coalfire The risks posed by the continually escalating number, variety, and sophistication of cyberthreats have in many ways worked to redefine...

Ethikos Editor’s Weekly Picks: The Ethical Obligation of Cybersecurity

Examining ethics and compliance issues in business since 1987 The ethical obligation of cybersecurity By Kevin Szczepanski for Buffalo Business First As lawyers we hold some of our...

The Components of Strong Cybersecurity Plans Part Five: Penetration Testing

  By Mark Lanterman, Chief Technology Officer, Computer Forensic Services Carolyn Engstrom, Director of Corporate Compliance In the fifth and final installment of this cybersecurity series, I will...

The Components of Strong Cybersecurity Plans Part Four: Technical Vulnerability Scanning

By Mark Lanterman, Chief Technology Officer, Computer Forensic Services Carolyn Engstrom, Director of Corporate Compliance As discussed in my previous three articles, strong security programs are comprised...

The Components of Strong Cybersecurity Plans Part Three: Security Auditing

By Mark Lanterman, Chief Technology Officer, Computer Forensic Services Carolyn Engstrom, Director of Corporate Compliance In the last two articles of this series, I discussed the role...