The rules indicate a new normal for public companies, private equity firms, and fund managers. This will require more disclosure detail in reference to their cybersecurity posture. It also means tighter time frames in which to acknowledge and address cybersecurity incidents.
EX2 Tech will provide the full lifecycle of IT and data solutions for federal agencies that require best-in-class capabilities in software development, IT operations and transformation, and cyber operations.
Following an administration memo providing a plan for all agencies to move toward zero trust architecture, we have three initial recommendations that should be addressed early in the process at federal, agency and sub-agency levels.
Evolver has named Dan Jetton as the new Vice President of Cybersecurity, joining one of its marquee service teams during a period of strategic expansion. Dan’s mission will be to advance Evolver’s cybersecurity strategy, building on its strong foundation with government and commercial clients.
Municipalities, like all modern organizations, are transitioning to digital primacy in their operations, but it’s leaving behind some substantial security oversights and blind spots. This trend coincides with an ongoing ransomware crisis that has started to target city governments more and more frequently.
Evolver discovered a major issue with the popular professional social network that could represent a major brand protection and potentially a cyber issue for companies around the world. Via LinkedIn's job posting feature, companies are being changed or intermingled with Russian companies and translated into Russian.
Evolver has been keeping up to date with trends in cyber insurance predicted or inferred from the research in our original 2015 whitepaper that received considerable coverage when released. Some of the predictions in the paper occurred soon after the paper’s release while other predictions are in different stages of development.
As the European Union heads toward the implement of the General Data Protection Regulation (GDPR) on May 25, companies of all sizes are preparing to comply with one of the broadest mandates in the history of digital regulation.
From Orangeworm’s targeted attack on MRI machines where the Trojan collects information about the host system, to the recent documented vulnerabilities on Phillips CT Scanners where they could be exploited by an attacker to steal protected health information (PHI) and other sensitive data files, there is no denying cyber attacks in the healthcare industry are on the rise.
Following the previous quarter's SEC guidance on cyber risk disclosure, companies are beginning to inform investors about material events that could impact the bottom line.