Thought Leadership

10 Tips For Building Your Cyber Resilience

10 Tips For Building Your Cyber Resilience

We live in a time of constant cyber threat, and one thing remains certain: cyber criminals are not slowing down. Organizations that can return to regular business operations quickly following a cyber attack will have a significant advantage over those that are unprepared. Unfortunately, according to the 2016 Ponemon Institute study, only 32% of IT and security professionals believed their... Read More
January 18, 2018
ITWC: How to achieve security compliance in the face of cyber threats

ITWC: How to achieve security compliance in the face of cyber threats

It was a great year for deceit in 2017 as hackers launched multiple successful attacks against corporations, organizations, governments, and individuals on an unprecedented global scale. The media cyber security darling — or demon — was the WannaCry crypto-worm, which held hostage the files of thousands of Windows users around the world until a Bitcoin ransom was paid. In all, WannaCry took... Read More
Cybersecurity CEO: When Your Company Gets Hacked, Will You Be Prepared?

Cybersecurity CEO: When Your Company Gets Hacked, Will You Be Prepared?

New report indicates cyber complacency is a growing problem in corporate boardrooms globally Los Angeles, Calif. – Jan. 16, 2017 “Every company will be hacked”, according to Roger Grimes, in a recent story he wrote for CSO. It’s a scary statement to make but Grimes, a 30-year tech industry road warrior who spent the past 11 years as Principal Security Architect at... Read More
January 16, 2018
‘Evolving’ PCI DSS 3.2 Requirements Become MANDATORY on February 1, 2018

‘Evolving’ PCI DSS 3.2 Requirements Become MANDATORY on February 1, 2018

Herjavec Group Contributors: David Mundhenk and Alex Spanovic, Security Consulting Services The current PCI DSS 3.2 requirements were previously considered best practices but are set to become operational in February. For example, multi-factor authentication becomes mandatory as of February 1, 2018. Companies must adhere to these compliance requirements, especially where payments are concerned.  Review the full PCI DSS 3.2 update... Read More
January 10, 2018
NEW REPORT: Cybersecurity Conversations For The C-Suite in 2018

NEW REPORT: Cybersecurity Conversations For The C-Suite in 2018

In 2018, get back to basics.  As we become accustomed to cyber attacks compromising enterprise environments and flashy breach headlines splashed across the news, we risk becoming complacent towards the enterprise need for a proactive cyber defense. It’s time we double down on compliance, cyber hygiene, and the elements of a proactive defense strategy in order to combat advanced cyber threats.... Read More
January 8, 2018

The 2017 Identity and Access Management Report

Cybersecurity Ventures predicts that organizations globally will spend more than $16 billion annually on IAM products and services by 2022. The Identity and Access Management (IAM) industry is facing many challenges as businesses understand the need for increased digital identity security. Many high-profile breaches in the past three years have occurred as a result of weak IAM practices. This annual... Read More
December 7, 2017

Herjavec Group Cybersecurity Cast: The 2017 Cybercrime Podcast: State of the Industry

Herjavec Group has launched its very own podcast, The Cybersecurity Cast! Produced by Herjavec Group, The Cybersecurity Cast features discussions on the latest news, trends, vulnerabilities, and exploits in the cybersecurity space. Topics include healthcare, ransomware, identity and access management, and more. Episode 5: The 2017 Cybercrime Podcast - State of the Industry Tune into Herjavec Group's Cybersecurity Cast to... Read More
November 30, 2017

Palo Alto Networks: Doing Multifactor Authentication the PCI Way

Mention the term multifactor authentication (MFA), to a typical system or application administrator, and you will encounter a wide range of responses, from a look of complete confusion to those sporting a barely contained, albeit outright scowl. Such individuals routinely log into dozens or even hundreds of computer and network systems daily to perform their administrative tasks. The use of... Read More
November 21, 2017

We Need To Protect Our Critical Infrastructure – NOW.

The cyber landscape has made it easier for criminals to steal all kinds of information – usernames, passwords, banking information, you name it! Cyber attacks are imminent across all industries and sectors, affecting our society on an individual and global economic scale. Critical infrastructure refers to sectors such as healthcare, financial services, agriculture, power, etc. These industries form the backbone... Read More