• img February 13, 2018

What CISOs prioritize in order to improve cybersecurity practices

In a new study by the The Financial Services Information Sharing and Analysis Center (FS-ISAC), CISOs weighed in on the most critical cyber-defense methods, frequency of cyber-preparedness reporting to their respective boards of directors as well as the current cyber chain of command within their respective financial organizations. Critical defense CISOs surveyed were split on […]

Read More
  • img February 13, 2018

Consumers want more IoT regulation

A demand for more regulation may seem counterintuitive in today’s world and yet that’s exactly what consumers who understand IoT technologies want, according to a new study from Market Strategies International. The study identified two distinct groups: the IoT “Haves” and the IoT “Have Nots.” The Haves are defined as people who have worked with […]

Read More
  • img February 12, 2018

‘Olympic Destroyer’ Malware Behind Winter Olympics Cyberattack, Researchers Say

The malware’s sole purpose was to take down systems, not steal data, Cisco Talos researchers say.   This post was originally published on https://threatpost.com/feed/. https://blacklakesecurity.com/olympic-destroyer-malware-behind-winter-olympics-cyberattack-researchers-say/

Read More
  • img February 12, 2018

Polisis: AI-based framework for analyzing privacy policies in real time

It has been known for a while that the overwhelming majority of Internet users doesn’t read privacy policies and terms of service before agreeing to them. Those few that do usually skim over them. That’s mostly because these documents and agreements are extremely long and – intentionally or unintentionally – written in a way that […]

Read More
  • img February 12, 2018

Download: The 2017 State of Endpoint Security Risk Report

To determine the cost and impact of evolving threats, the Ponemon Institute, a preeminent research center dedicated to data privacy and protection, surveyed 665 IT and security leaders. Their responses indicate today’s organizations are struggling to secure their endpoints, and paying a steep cost for each successful attack — $5 million for a large organization […]

Read More