The use cases for Software as a Service (SaaS) are undeniably vast and advantageous. However, the nature of subscribing to a cloud service leaves a ton of ambiguity as to who is responsible for its security… The vendor or the customer? This article will present a 10,000-foot view of SaaS and the unintentional risks that surface when organizations bring in cloud services like SaaS.
Companies looking to build a cyber risk management program have four options. This video describes the various options, plus pros and cons of each. It is important to understand what is available so you can make the best choice for your organization's protection and longevity.
For some time now, organizations around the globe have been met with looming cybersecurity threats, increased pressure from stakeholders, and catastrophic internal IT Security fatigue. As a result, one of the most in-demand leadership positions is the Chief Information Security Officer. Just like numerous other “as a service” platforms, the rise of “CISO as a Service” or Virtual CISO (vCISO) has also become a major game-changer for emerging and medium-sized businesses, allowing them to gain the same cybersecurity direction as a large enterprise, but at a fraction of the cost.
Wouldn’t it be a dream come true if you could predict the future and know what market changes, natural disasters (or pandemics), and cyber threats will occur around your organization? While we don’t have a hack for this, we do know a risk assessment helps prepare your organization for any unforeseen circumstances such as these.
The Idaho Technology Council hosted an excellent virtual conference, Develop.Idaho, on February 25th, 2021. This event has been running for 10 years and has grown dramatically since inception. Introductions were provided by ITC's President, Jay Larsen, and a keynote speaker and CEO of Albertsons, Vivek Shankaran.
They say, “rules are meant to be broken,” but in the case of a cybercriminal, rules are meant to be created… Email rules that is. A new twist on the age-old email phishing tactic has enabled attackers to cause over $1.7 billion in losses since 2019. Business Email Compromise (BEC) scams account for more than half of all losses according to the FBI’s Cyber Crime Report.
Silent Sector® builds and strengthens exceptional cybersecurity programs for US-based mid-market and emerging companies.
Expertise-Driven Cybersecurity®