Wednesday, October 30, 2019

Cyber insurance throws a wrench into incident response

 
Security Digest
Information security news and advice from TechTarget's network | October 30, 2019
TechTarget
FEATURED STORY
Cyber insurance has changed incident response -- for better or worse
by Rob Wright, News Director

Cyber insurance carriers are assuming greater control over how enterprises conduct incident response, which has caused angst and frustration among some security vendors.

Advertisement
NEWS
 
Another CCleaner attack hits Avast supply chain

Avast was able to stop an attempted supply chain attack targeting its CCleaner software, but experts say all enterprises should be wary of similar supply chain attacks.

 
NordVPN enlists ethical hackers, launches bug bounty programme

Breached consumer VPN supplier details steps it is taking to shore up its cybersecurity posture after an unknown actor gained access to one of its servers.

EXPERT ADVICE
 
CompTIA PenTest+ practice test questions to assess your knowledge

Think you're ready to take the CompTIA PenTest+ certification exam? Test your skill set with some of the sample multiple-choice questions you may be facing.

 
On a penetration tester career path, flexibility and curiosity are key

Becoming a pen tester takes more than passing an exam. Learn the qualities ethical hackers should embrace to achieve success on their penetration tester career path.

 
Understand the top 4 use cases for AI in cybersecurity

AI applications in security offer organizations four unique benefits. Learn how machine learning advances can change industry approaches to threat detection and prevention.

 
What are the roles and responsibilities of a liaison officer?

While liaison officer responsibilities vary depending on the company they work for, their strong organizational and communications skills make them critical to incident response.

 
Combat the human aspect of risk with insider threat awareness

When it comes to insider threat awareness and prevention, enterprises would be wise to marry a people-centric approach with a technology-centric approach.

 
How the future of data privacy regulation is spurring change

Some companies have taken steps to improve data governance in anticipation of data privacy rules. Experts discuss the challenges of compliance in a shifting regulatory landscape.

 
5 cloud storage privacy questions to ask potential providers

Data confidentiality in cloud computing is a major enterprise concern, yet providers are often lacking in their details. Here are the questions to ask before adopting a service.

 
Regs create blueprint for industrial controls, IoT and IIoT

Protecting devices associated with industrial control systems, IoT and IIoT presents many challenges, but wide-ranging regulatory mandates can help guide cybersecurity processes.

About This E-Newsletter
The Security Digest is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.

Click to: Unsubscribe.

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com.

© 2019 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

No comments: