Sunday, July 21 2024
Photo by Simon Kadula on Unsplash.

Navigating Manufacturing IIoT Cybersecurity Challenges

John Powers 0

Guarding the Gears: Government policy and industry collaboration to mitigate cyberthreats to manufacturers. The smart factory is on the rise. […]

Read More

How will SEC’s Cybersecurity rules affect funds?

Khushi Arora 0

The U.S. Securities and Exchange Commission (SEC) recently proposed new cybersecurity regulations for investment funds and third-party service providers. The […]

Read More

Regulatory Spotlight: Avoiding the jab-hook combo

Jeremy Seth Davis 0

When regulators squabble, who loses? Everyone. Regulatory disharmony is real, folks—and so far, we don’t see signs of the trend […]

Read More

Crypto Harmonization—or Regulatory Turf Wars?

CISOstack 0

By Stanley I. Foodman Don’t expect aligned, coherent rules anytime soon Multiple enforcement agencies within the US government agree that […]

Read More

What’s Driving the Push for Digital Central Bank Currencies?

Khushi Arora 0

As governments explore methods for improving payment systems, especially for cross-border transactions, support for blockchain-based national digital currencies continues to […]

Read More

NYDFS Ransomware Guidance: “We Must All Do Our Part”

Ellie Buscemi 0

The New York Department of Financial Services has issued new guidance regarding ransomware attack mitigation. The state regulator identified seven […]

Read More

The Week in Cybersecurity

SD Editor 0

Weekly round-up of cybersecurity news, updates, and. highlights that matter to senior financial executives and decision-makers. New Powers for CISA […]

Read More

On Regulatory Disincentives

Jeremy Seth Davis 0

First American Financial Corp. agreed to a settlement with the Securities and Exchange Commission for failures in disclosure controls and […]

Read More

As Ransomware Soars, Insurers Mull Changes

Ellie Buscemi 0

As ransomware attacks soar, payment requests have begun to attract increased legal and regulatory scrutiny. In this complex environment, industry […]

Read More

US and EU Launch Trade and Technology Council

Khushi Arora 0

During the EU-US Summit in Brussels, the United States and European Union set a joint transatlantic agenda, agreeing to a […]

Read More
1 2
Widget

Don’t Miss

Sevco Security Platform Product Review

Ellie Buscemi

What is the Sevco Security Platform? The Sevco Security Platform is a cyber asset attack service management (CAASM) product that focuses on aggregating and correlating data from across a company’s cybersecurity infrastructure to give cybersecurity professionals a better sense of what the company’s infrastructure looks like as a whole. The platform’s sources include a company’s […]

Cyber Deals: Huntress, Cyberhaven, and SpyCloud

CISOstack

Cybersecurity Surge: Top Funding Rounds and Strategic Acquisitions Fuel Growth in AI, Cloud Security, and Threat Prevention Solutions

Fidelis Elevate: A Deep Dive

Ellie Buscemi

What is Fidelis Elevate? Fidelis Elevate is an open extended detection and response (open XDR) solution focusing on network protection, endpoint security, and cyber attacker deception. The platform aims to protect various elements of a company’s infrastructure, such as devices and servers while tracking suspicious behavior and preventing access to cyber criminals. What features does […]

Partially closed laptop screen

Best Extended Detection and Response (XDR) Solutions

Lara Oporto

What is Extended Detection and Response and how does it work? Extended Detection and Response (XDR) is a cybersecurity system that gathers information from different places like computers, networks and emails. Unlike other security tools that focus on one area like computers or networks, XDR looks at everything together. The comprehensive approach helps to find […]

Close up of computer chip

Best Managed Detection and Response (MDR) Solutions

Lara Oporto

What is Managed Detection and Response? Managed Detection and Response (MDR) is a cybersecurity service that provides continuous monitoring, threat detection and incident response capabilities. MDR achieves these capabilities through the deployment of advanced technologies such as machine learning and behavioral analytics as well as analysis from security professionals. MDR is a cybersecurity service that […]

Best Hyperconverged Infrastructure Software

Ellie Buscemi

What is Hyperconverged Infrastructure and how does it work? Hyperconverged infrastructure (HCI) is a software that provides computing, storage and network operations for a company from a single point on a company’s hardware. Originally, computing, storage and network operations were divided in a company’s hardware infrastructure and potentially provided by separate vendors with different management […]