Blog

Our top industry experts weigh in on topics that could affect you and your organization

  • Ready for ransomware? An executive perspective

    Posted on January 29, 2019 by John Fehan

    An old client was calling. His new employer had been hit with ransomware. Applications were down across their network, with servers encrypted. Active Directory was not responding; even laptops were dead. My client was calling for help. He was calling everyone for help—his old contacts, consulting firms, value-added resellers, vendors—everyone with whom he had relationships. Learn More

  • Evolution of Cybersecurity Risk Management

    Posted on November 14, 2018 by Mark Coderre

    In our increasingly connected world, when it comes to threat landscape and business risks, we face unprecedented challenges.

    In the next three years IoT devices are expected to grow to 30 billion connected devices. According to the Boston Consulting Group, banks face 200 regulatory changes daily, as penalties for cyber threats rise to $345 billion. Learn More

  • What to Do When Automated Application Security Testing Falls Short

    Posted on August 24, 2018 by Seth Art and Josh Belles

    As the number of applications developed explodes, the prospect of performing Application Penetration Testing on each application, with limited budgets and scarce resources, becomes increasingly daunting and seemingly impossible. Application risks will never be sufficiently mitigated by relying on automated scanning alone. Typically, there are three main dynamic options practiced today, and they vary in coverage, accuracy, and cost. Learn More

  • The Myth of the Operational Technology Air Gap

    Posted on August 2, 2018 by Nigel Stanley

    The cybersecurity field of operational technology (OT) is buzzing as companies increasingly realize that their production systems, manufacturing plants, chemical processing plants or industrial control systems are at risk from cyber-attacks. This realization is fuelled by a big uptick in hacker interest as such systems are insecurely connected to the internet and compromising them is a change from stealing credit card information. Learn More

  • Q & A with GDPR Expert: What to know about Privacy and Security for IoT Devices

    Posted on July 13, 2018 by Sally Guenette

    This blog post lists the questions raised on TUV Rheinland OpenSky’s recent webinar: Approaches to Privacy and Security for IoT Devices in a GDPR World. For a recording of the webinar, please click here.
    Questions and Answers
    Question 1: Is GDPR targeting small to medium-sized companies? Learn More

  • Ever-Increasing Cybersecurity Threats: Do you have the right DR strategy in place?

    Posted on June 19, 2018 by Gregory Cote

    Cyber threats keep executives up at night because cyber-criminals are well funded and highly motivated to acquire, or hold for ransom, valuable corporate data. In other cases, destructive malware (for example NotPetya), cause havoc and platform destruction just like a wildfire. These threats and resulting attacks can severely affect your organization financially and reputationally. By some estimates, 70 percent of companies go out of business after a major data loss. Learn More

Before you leave…
want to sign up for our newsletter?