On Data Privacy Day, Kroll’s Alan Brill and Brian Lapidus share recommendations for companies who have fallen victim to ransomware attacks, emphasizing the importance of reporting a breach promptly and how to investigate an attack under the assumption that data...
Read moreLMG Security’s Madison Iler discusses how to structure a vendor risk management program (and where to spend your time) and shares common missteps that can reduce program effectiveness. As evidenced by the recent far-reaching SolarWinds breach, supply chain attacks represent...
Read moreAs unpleasant an option as it is, victims of ransomware attacks often just pay up in order to recover sensitive data. Nutter’s Seth Berman and James Gately offer an alternative. Ransomware attacks hit suddenly and without apparent warning. One morning,...
Read moreThe role of SOC 2 compliance in securing your data can’t be overstated. Strike Graph CEO Justin Beals discusses how to find the right audit partner – one who meets your needs as they test the operational effectiveness of your...
Read moreKnowBe4’s Chief Evangelist and Security Officer, Perry Carpenter, discusses how to protect your organization’s data from an often-overlooked risk. Sponsored Organizations set up all sorts of technology-driven safeguards to help them protect their own and their customers’ data. These investments...
Read moreKnowBe4’s Stu Sjouwerman offers a peek into the ways of a cybercriminal, providing organizations unique insights into how they can strengthen their cybersecurity strategy. With everything digital becoming automated and connected, a cyber pandemic could spread faster than a biological...
Read moreFollowing a recent advisory from the Office of Foreign Assets Control, attorneys from Manatt, Phelps & Phillips consider the difficulty of paying ransomware attackers’ ransoms without violating U.S. sanctions law. Picture this: At some point in the next six months,...
Read moreAn internal investigation can feel like a high-stakes game of needle-in-the-haystack, and current world challenges set that haystack on fire. Casepoint’s David Carns addresses how organizations can plan to respond effectively while avoiding cost and risk. While most of today’s...
Read moreOrganizations are under an ever-growing host of threats. We’re seldom as safe as we think. Information Security Forum’s Steve Durbin outlines some standard beliefs it’s time to call into question. While the internet is an essential business conduit for countless...
Read moreThe Cybersecurity Maturity Model Certification (CMMC) program is supposed to shore up cybersecurity across the DoD’s 300,000+ contractor base. Authentic8’s Abel Vandegrift discusses the progress the Pentagon and other stakeholders have made over the past few months. Since the start...
Read more“Never trust, always verify” isn’t a new concept in cybersecurity, but it’s gaining new credence among organizations as they attempt to mitigate growing cyber risk. Towerwall CEO Michelle Drolet explains why. The COVID-19 pandemic has caused a dramatic shift in...
Read moreIoT risk management and security don’t seem to get the attention they deserve until there’s a data breach. KnowBe4’s James McQuiggan discusses the often-overlooked cyber risk associated with using IoT devices and what organizations can do to protect themselves. Thinking...
Read moreFounded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security.
Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls.
© 2024 Corporate Compliance Insights
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |