Friction has existed between IT departments and Security Operations for years. If turf wars and business silos are not the cause, the lack of collaboration and communication will often lead to disharmony between the two. The left hand should know what the right hand is doing and vice versa, but that can only happen if the problems between them are acknowledged and addressed. Check out our recent conversation where Lynx CEO Gina Mahin and Steven Bay, Director of Security Operations and Threat Intelligence at Security On-Demand, discuss how Integrated Risk Management can bring a ceasefire to this friction and turn these teams into partners working toward the common goal of protecting the business.
Covid-19 forced organizations to rethink and restructure overnight. Rapid changes in networks and working practices mean increased attack surfaces and security gaps. As organizations begin to lift restrictions, we wonder - What does the “new normal” look like and how are organizations managing through the changes?
Come and join us to discuss how the Covid-19 pandemic is impacting organization's cybersecurity programs. We have a remarkable panel lined up to share their thoughts and insight.
Companies spend millions every year on products and services to fix all their cyber security vulnerabilities. Then they spend just as much money on highly skilled, well-trained cyber professionals to manage those systems. All those resources are useless when an accountant, or a C-level’s executive assistant, or an HR manager, clicks a link they received in their email and BOOM.
Much has been written about the benefits of an MSSP, especially if you are a big organization. It allows for a consistent, centralized, and transparent view into your organization’s security platform. But, how do you decide if an “in-house” security management program is effective enough? What is the cost-benefit analysis when deciding to budget expenses for in-house versus out-sourcing?
One-Fifth Of Enterprise Respondents Reported A Third-Party Breach according to Forrester's Top Cybersecurity Threats of 2018.
Cyber security is a skill based occupation. The only way to improve a cybersecurity expert skill set, is by accumulating hands-on experience. Similar to fighter pilots, who don’t often face the challenges and threats of the real world , training cybersecurity experts can be effective only by simulating hyper-realistic scenarios which allows cybersecurity individuals and teams to face a real threat, and improve their skills based on the experiences.
Every year, far too many businesses are compromised by cybercriminals, and each time, important data and sensitive information are accessed and exploited. In all situations, cybercriminals will use their best technology to steal data and even the finances of big businesses.
Many companies in the healthcare market struggle with compliance projects and finding the time and knowledgeable resources, as-well-as the budget, to adhere to government regulations in a timely manner.
ZURICH (20.7.2017) LUCY Security is growing and innovating: Certified partner in the US now delivers new anti-ransomware scenarios with LUCY V3.6. With approximately 25% of sales, the US market represents the most important market area for the Swiss product manufacturer.
The IT risk, compliance and cybersecurity company, Lynx Technology Partners, (LYNX) strengthens Lucy's existing presence in the US market.
Managing IT risk is part of running any business these days. Regardless of what business you’re in, understanding IT risk can help you increase network security, reduce management costs and achieve greater compliance. Corporate leaders who fail to identify, assess and mitigate IT risk are setting themselves up for serious security breaches and financial losses down the road.