All Cybersecurity articles
-
Webinar2023 Cybersecurity Trends: Escalating Human Error Risks
Webinar produced by GRC World Forums in association with SoSafe
-
FeatureAutomate and Educate at scale: Two key focuses when it comes to Vendor Risk Management
According to KPMG, 73% of organisations have experienced at least one significant disruption from a third-party cyber incident within the last three years. And with breaches involving third parties costing businesses more than $4.29 million on average - investment in vendor risk frameworks is increasing at a rapid rate.
-
FeatureCyber Security, is it a core part of your ESG?
Let’s take a look at why cyber security is a core part of ESG.
-
FeatureElevate your cybersecurity with C2 Risk
Technology plays an integral role in both personal and professional aspects of our lives but the importance of robust cybersecurity cannot be overstated. With threats looming everyday, the C-Suite and organisations alike need to be proactive in securing their digital defences to protect themselves against potential risks posed by third-party suppliers.
-
WebinarCybersecurity Threats: Know The Risks Your Third Parties Pose to Your Business and How to Defend Against Them
In 2021 alone there was a 62% global attack spike in ransomware, and it was made clear that the cyber threats are becoming not just more common, but also more sophisticated.
-
WebinarAfter the attack: Mitigating Organisational Impact of a Data Breach? (LATAM region)
After the attack: Mitigating Organisational Impact of a Data Breach?
-
NewsCyber Security Hub @ #RISK
#RISK – Europe’s Leading Risk-Focused Expo: November 16 & 17, ExCeL, London
-
WebinarAfter the attack: There’s No Place for Guesswork in Cyber Attack Investigations (South Asia Edition)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
WebinarAfter the attack: Mitigating Organisational Impact of a Data Breach (Central & East Europe Region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
WebinarAfter the attack: There’s No Place for Guesswork in Cyber Attack Investigations (Nordic Benelux region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”
-
FeatureKey Tactics for Effective Cybersecurity
As the pandemic pushed millions of workers home, corporations rushed to build infrastructure to support their new remote workforce.
-
WebinarAfter the attack: There’s No Place for Guesswork in Cyber Attack Investigations (South Europe region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
WebinarAfter the attack: Mitigating Organisational Impact of a Data Breach (DACH region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
ebookExecutive Summary: ICS/OT Cybersecurity Year In Review 2021
Get what you need to know quickly to protect your critical assets by reading the Executive Summary of the 2021 ICS/OT Year in Review.
-
VideoThe Role of Cybersecurity in Enterprise Risk Management (ERM)
This session takes a look at how, integrated risk management has become a popular process for managing the risks facing an organisation, and is the new method of choice for business leaders and security managers alike.
-
Webinar2022 Trend Watch: Realizing the Full Potential of SASE and Zero Trust
The events of 2021 have created a paradigm shift in cybersecurity. The steady cadence of large-scale cyber attacks have accelerated a move away from perimeter-focused security to Zero Trust. While core foundations of Zero Trust have been implemented, many tech leaders are still missing a critical piece of the puzzle for safeguarding their data.
-
NewsDutch police gives final warning to DDoS booter customers
More than a dozen customers of a distributed denial-of-service (DDoS) website received a final warning from Dutch authorities, informing them that future cyber violations will result in prosecution.
-
NewsGoogle announces cybersecurity action team
Google is bringing together a group of experts to deliver strategic advisory services, trust and compliance support, customer and solutions engineering and incident response capabilities.
-
NewsResearch reveals rise in supply chain cybersecurity breaches
Vendor risk visibility and continuous third-party monitoring remains concerningly low despite heightened awareness of the risk and substantial budget increases to tackle the problem
-
NewsUS government to sue contractors who don’t report a breach
The US Department of Justice has announced that under the new Civil Cyber-Fraud Initiative, government contractors will be held accountable in civil court if they don’t report a breach.









