Study: More enterprise cloud apps corrupted with malware | Expert offers insights on how CISOs could bolster cyberrisk response | Palo Alto Networks unveils cybersecurity framework with PwC
Created for {EMAIL} | [Web Version]
June 16, 2016
[Â]
[Data Security & Privacy SmartBrief]
[SIGN UP] ⋅ [FORWARD] ⋅ [ARCHIVE]
Top Story
[Study: More enterprise cloud apps corrupted with malware]
Enterprise cloud apps with malware are increasing, according to a Netskope study. Eleven percent of cloud apps that are allowed to be used by an enterprise are laced with malware, the study says, and 26% of malware files are shared. Malware-laden apps have almost tripled since last year, Netskope notes.
[CIO Dive] (6/10)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
Data Security & Privacy
[Expert offers insights on how CISOs could bolster cyberrisk response]
Chief information security officers should help board members respond to cyberrisks by developing a cyber value-at-risk model for their organizations, which includes quantifying cyberrisks in financial terms, understanding high-risk areas, identifying where risks can be quickly reduced and evaluating the efficacy of cybersecurity initiatives, writes Chris Veltsos, associate professor at Minnesota State University, Mankato. Such a model "would give board directors the confidence they need to make the high-stakes cyberrisk decisions that are so critical to the business today," Veltsos writes.
[Dark Reading] (6/15)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
- [Palo Alto Networks unveils cybersecurity framework with PwC] Healthcare IT News (6/14)
Cyber Risk
[Threats to college tech security are increasing, report finds]
Cyberthreats such as malware, ransomware and security breaches are increasing for the education sector, according to Symantec's Internet Security Threat Report. Threats to higher education, in particular, come from the increased use of smartphones and other connected devices on campus, the report finds.
[eCampus News (free registration)] (6/14)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
By the Numbers
[Report: Analysts struggle to predict cybersecurity costs]
Global cybersecurity spending is on pace to surpass $1 trillion between 2017 and 2021, a Cybersecurity Ventures report says. Cybercrime is increasing so rapidly that analysts are struggling to forecast costs, the report says.
[CSO] (6/15)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
Practice & Policy
[US: Law lets businesses share data with other firms, not just government]
[US-POLITICS-HOMELAND]
(Saul Loeb/Getty Images)
The departments of Homeland Security and Justice have released guidance saying that the Cybersecurity Information Sharing Act doesn't only allow businesses to share threat information with the government. The law also lets companies provide that data to other businesses, they said.
[The Hill] (6/15)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
- [Experts: Cyberinsurance alone can't curb entities' exposure] Business Insurance (tiered subscription model) (6/15)
AllClear ID News
Is your team ready for a data breach?
As data breaches increase in scale and frequency, businesses must prepare today to ensure an effective, customer-focused response. Consumers, regulators and the media want a well-orchestrated response launched just days after a data breach, and preparation in advance is critical to success. [Download this Incident Response Workbook] and learn:
- Key considerations for data breach preparation and customer notification
- Best practices for the customer-facing aspects of data breach response
- Recommendations for planning and executing a well-orchestrated response
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
4 steps to respond more effectively after a data breach
The most thorough preparation pre-breach won't matter if your response team is derailed by emotions like denial, tunnel-vision and anger. [Download this whitepaper], Factoring the Human Element Into Your Data Breach Response, to learn which emotions are most likely to derail your team and steps you can take now to be ready to address them during a crisis.
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
Learn more about AllClear ID: [About AllClear ID] | [AllClear ID Breach Response]
[AllClear ID Resources]
You cannot change your destination overnight, but you can change your direction overnight.
Jim Rohn,
entrepreneur
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
[Sign Up]
[SmartBrief offers 200+ newsletters]
Subscriber Tools:
[Manage Subscriptions]
[Update Your Profile]
[Unsubscribe]
[Send Feedback]
[Archive]
[Search]
Contact Us:
Editor - [Amanda Gutshall]
Mailing Address:
SmartBrief, Inc.®, 555 11th ST NW, Suite 600, Washington, DC 20004
© 1999-2016 SmartBrief, Inc.®
[Privacy policy] | [Legal Information]
Â