Infographic: 5 Resolutions to Improve Cybersecurity Right Now

Infographic: 5 Resolutions to Improve Cybersecurity Right Now

Making cyber risk management plans for 2019? The experts at CyberFortis, the financial services division of Secure Halo™, offer five steps every organization should resolve to take for a stronger cybersecurity...
Beyond Compliance: Making Security a Business Strategy

Beyond Compliance: Making Security a Business Strategy

White Paper – Beyond Compliance Corporations of all sizes are awash in regulatory requirements, including a growing number related to data security and third-party cyber risk. The protection of consumer data, investor information and systems, and credit card...
Security Ratings and Assessments – Why Together They Achieve Better Enterprise Health

Security Ratings and Assessments – Why Together They Achieve Better Enterprise Health

White Paper – Security Ratings and Assessments Resource-conscious risk and IT professionals may turn to security ratings which scan from the outside only as a relatively quick metric to gauge the effectiveness of their organization’s or third parties’...
Ready for GDPR? Ideas to Update Your Risk Management and Privacy Programs

Ready for GDPR? Ideas to Update Your Risk Management and Privacy Programs

GDPR White Paper – Enforceable as of May 25, 2018, the General Data Protection Regulation (GDPR) carries significant consequences for failing to comply with its requirements. Non-compliance can result in a fine of up to 4% of annual global revenue or €20...
Vulnerability Areas Hackers Scan For When Choosing Their Next Victim

Vulnerability Areas Hackers Scan For When Choosing Their Next Victim

In the spirit of Halloween, check out these treats for cyber tricksters. Six vulnerability areas that hackers target when deciding who their next victim will be and ways to combat them: http://bit.ly/2iN6rcS
Dragonfly 2.0 Shows Energy Companies Remain in Geopolitical Crosshairs

Dragonfly 2.0 Shows Energy Companies Remain in Geopolitical Crosshairs

Nation-states attack critical infrastructure as part of a broader military strategy to deny an adversary access to systems crucial to its defense. Security researchers recently suggested that the U.S. and European energy sectors are being targeted by hackers known as...