As part of its ongoing commitment to cyber threat research, Kroll’s threat intelligence team looked at hundreds of real-life cyber incidents to determine how intrusions occur. Alan Brill, senior managing director of cyber risk at Kroll, explains what they’re seeing...
Read moreWith increased scrutiny from a litany of regulators, cryptocurrency exchanges and financial institutions are now required to monitor, flag and report suspected ransomware payments. Doing so calls for a range of technological capabilities and a sophisticated approach to identifying suspicious...
Read moreCompliance teams could see an uptick in cybersecurity whistleblower complaints as regulators expand protections and incentives for those reporting data breaches, vulnerabilities or other cyber-related misconduct. But cybersecurity incident reports require special handling. Here’s how to prepare for the unique...
Read moreIn 2016, hackers associated with the North Korean government almost made off with $1 billion from the Bank of Bangladesh. Cyber criminals were paying attention. In this excerpt from cybersecurity expert Jon DiMaggio’s upcoming book, the author runs down how...
Read moreData anonymization techniques that maintain a 1:1 relationship between personal info and the people to whom they relate are appropriate in certain use cases. But depending on these techniques in live production environments leaves companies—along with their users and/or employees—vulnerable...
Read moreThe Biden Administration and DOJ intend to pursue cyber fraud through the False Claims Act (FCA), with an emphasis on whistleblower reporting. The implications could devastating for unsuspecting health care compliance teams and lead to multiple exposures to enforcement.
Read moreNew rules proposed by the Securities Exchange Commission could change the way the advisors and funds communicate cyber risk to investors. If adopted, funds would be required to maintain records of cybersecurity polices and procedures, and report incidents within a...
Read moreYou know the resources and commitment required for a successful cybersecurity program. But your company's leaders might not. Communicating what they need to know calls for both art and science. Arm yourself with data, common language and a pitch that...
Read moreSince last year's Data Privacy Day, system down times have continued to lengthen. Cyber insurance has continued to grow more expensive. AI remains a double-edged sword. As always, awareness training and security protocols serve the best shields in the ongoing...
Read moreIn 2022, nations and organizations around the world will continue working to protect customer data against hackers and accidental breaches. From new international regulations to artificial intelligence, here is a look at how cyber compliance is shifting priorities. We often...
Read moreIt’s no secret that the volume of data created by organizations and people multiplies daily. That data is spread across more tools, platforms, devices and clouds than ever before, creating regulatory challenges and security risk. This article looks at simplifying...
Read moreMultiple factors are pushing ransomware, including growing attack patterns that include double and triple extortion, criminal business models taking advantage of ransomware, cryptocurrencies and wave of supply chain attacks During the COVID-19 crisis, another outbreak took place in the cyber...
Read moreFounded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security.
Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls.
© 2022 Corporate Compliance Insights
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |