Home
Sectors
AML
Artificial Intelligence
Audit Management
Biometrics
Blockchain
Security Talk
About
GRCInsights
News
Magazine
Search
Sectors
AML
Application Security
Artificial Intelligence
Audit Management
Biometrics
Blockchain
Cloud Security
Compliance
Content Security
Cryptocurrency
Cyber Security
Data Loss Prevention
Data Security
Defence
DevSecOps
Digital Forensics
Disaster Management
Encryption
Endpoint Security
Enterprise Security
Firmware Monitoring
Fraud Management
Governance
GRC
IAM
IGA
Infrastructure Security
IoT Security
KYC
Managed Security
Mobile Security
Network Automation
Network Security
Payment Security
Penetration Testing
Perimeter Security
Physical Security
Project Management
Ransomware
Regulatory
Risk Management
SaaS Security
SCRM
Security Assessment
Security Automation
Security Consulting
Security Tools
Server Security
Third Party Risk
Threat Management
Top Security tools
Vulnerability Management
Web Security
Zerotrust Security
Security Talk
Home
About
GRCInsights
News
Magazine
Linkedin
Twitter
Search
Sectors
AML
Application Security
Artificial Intelligence
Audit Management
Biometrics
Blockchain
Cloud Security
Compliance
Content Security
Cryptocurrency
Cyber Security
Data Loss Prevention
Data Security
Defence
DevSecOps
Digital Forensics
Disaster Management
Encryption
Endpoint Security
Enterprise Security
Firmware Monitoring
Fraud Management
Governance
GRC
IAM
IGA
Infrastructure Security
IoT Security
KYC
Managed Security
Mobile Security
Network Automation
Network Security
Payment Security
Penetration Testing
Perimeter Security
Physical Security
Project Management
Ransomware
Regulatory
Risk Management
SaaS Security
SCRM
Security Assessment
Security Automation
Security Consulting
Security Tools
Server Security
Third Party Risk
Threat Management
Top Security tools
Vulnerability Management
Web Security
Zerotrust Security
Security Talk
Home
About
GRCInsights
News
Magazine
Home
Security
Ransomware
Ransomware
Ransomware
Recovering from Ransomware
By Parham Eftekhari, Executive Vice President, Collaboration / CISO Communities, CRA, CyberRisk Alliance
-
November 28, 2022
Ransomware attack campaigns bypass advanced security controls by exploiting trusted humans and human operations...
GRCInsights
The human factor, the weakest link of the chain
By Victor Plata Mazzotti, MATI, CISSP., Omnifon
-
June 15, 2022
In the post-pandemic era the industry and institutions rely more than ever on remote...
GRCInsights
Ransomware Readiness and Recovery: 8 Ways to Keep Yourself Out of Cyber Criminals’ Crosshairs, and 8 More Ways to Respond if You Do Become...
By Bryce Austin, CEO, TCE Strategy
-
May 26, 2022
There were seven people seated around the table: the CEO, the VP, the CFO,...
GRCInsights
How to Reduce Cyber Reinsurance Risk
By Harris Schwartz, Field Chief Information Security Officer, Elevate Security
-
April 22, 2022
Cyber reinsurance and cyber liability insurance have many companies running ragged due to new...
GRCInsights
Protecting Your Business in An Era of Increased Ransomware Attacks
By Roger Lewis, CEO, CMIT Solutions
-
April 11, 2022
Cybersecurity has always been important, but with escalating global tensions relating to the war...
GRCInsights
Why Do IT Risk Assessments Fail?
By John Kronick, CISO , CISOSHARE
-
March 25, 2022
Every day we are faced with choices. Do I get up and go to...
GRCInsights
Ransomware: To Pay or Not to Pay?
By Barry Coatesworth, Director - Risk, Compliance & Security, Guidehouse
-
March 21, 2022
Last year, CNA Financial Corporation, one of the biggest US insurance companies reportedly paid...
GRCInsights
Ransomware Impact Correlates with Organizational Security Mindset
By Kris Bondi, CEO and Co-founder, Mimoto
-
March 18, 2022
Oddly, the general business reaction to ransomware attacks mirrors the reaction to Covid-19. While...
GRCInsights
Praemonitus, praemunitus –– Battling the Evolution of Ransomware
By Ash Hunt, Group Head of Information Security, Sanne
-
March 17, 2022
Few things in cyber security have become as ubiquitous in organisations, modern parlance and...
Hot Topics
Intelligence Analysis in Business: Understanding its Importance and Role
Privacy Enhancing Technologies: protecting privacy in the age of big data
5 Key Privacy and Data Protection Issues to Consider Before You Launch
Load more