David vs. Goliath: The Challenges Small Businesses Face in Cyber Insurance
The digital age has ushered in a golden era for small businesses (SMBs).…… Purchase RequiredThis content requires that you purchasemore...
The digital age has ushered in a golden era for small businesses (SMBs).…… Purchase RequiredThis content requires that you purchasemore...
The name WannaCry still invokes memories of chaos and disaster amongst anyone in the technology world. The anniversary of this widespread attack in May each year has been named Anti-Ransomware Day, to encourage organisations to back up their data and adopt necessary security protections.
Read more...From our Cyber Insurance Issue: In today’s interconnected digital world, there is no such thing as an “unconnected” business. That means for most that the extent of their online exposure will include running a calculated risk of becoming the victim of a cyber-attack because that event risk can never be zero. Or does i
CTEM is a term that was coined by Gartner (who else?) and is used to encapsulate an approach that seeks to assess and manage the exposure of the business on a continuous basis.
There are many themes arising for the RSA Conference next week including tools and services to protect against originating with unsecured third parties in the supply chain. That is a crucial issue in every industry especially with almost every company doing business with a supplier in the cloud. But the scope of the problem is almost impossible to resolve. The reasons are myriad.
With every Fortune 1000 business and government agency doing business with tens of thousands of third-party suppliers, the odds of finding one chink in the security protocols are very good for the criminals and state actors looking to do damage.
Social engineering can easily bypass the strongest technical defenses. It only takes a single lapse in digital hygiene to open the door to man-in-the-middle attacks, invite malware injections, and launch credential stuffing. It is also the favorite strategy of ransomware gangs.
Ransomware grabs headlines and remains highly lucrative for ransomware gangs. When compared to other forms of cybercrime, however, ransomware is really a minor issue. There are more than 33 million small businesses (under $100 million in revenue) operating in the United States alone representing 99 percent of all businesses. However, according to a study produced by the Black Kite Research and Intelligence Team, less than 5000 of them experienced a successful ransomware attack in the last 12 months...
In 2013, Intel launched World Password Day to raise awareness of the relevance of secure passwords – with limited success. Today we might be at the brink of finally saying goodbye to password.
Read more...Ethics in AI is an afterthought in development, making adoption a risky proposition. New industry standards, such as ISO/IEC 42001, and rigorous testing for generative AI models, guided by established ethical principles in AI management, can ease apprehension surrounding the advancement of this truly transformative technology.
Huge hazards and pitfalls loom in AI adoption without adequate safeguards and guardrails. There’s potential for perpetuating stereotypes, spreading misinformation, advancing hate speech, hallucinating, exposing private data, and unforeseen harm. The potential for facing legal and financial consequences due to the inappropriate use of generative AI is genuine with devastating outcomes.
Google and the state of California have come to loggerheads over legislation designed to require Google to provide financial support for local journalism. Naturally, Google is fighting this with a PR and lobbying blitz. They and their allies may be missing the point. Whatever the outcome, it could have a profound impact on the democratic process.
The legislation, The California Journalism Preservation Act (CJPA) has been wending its way through the California legislation for about a year. The text of the law says, "This bill … would require … a covered platform (as in Google) to remit a … payment to each eligible digital journalism provider … The … payment would be a percentage, as determined by a certain arbitration process, of the covered platform's advertising revenue generated during that quarter."
Google and the state of California have come to loggerheads over legislation designed to require Google to provide financial support for local journalism. Naturally, Google is fighting this with a PR and lobbying blitz. They and their allies may be missing the point. Whatever the outcome, it could have a profound impact on the democratic process.
The legislation, The California Journalism Preservation Act (CJPA) has been wending its way through the California legislation for about a year. The text of the law says, "This bill … would require … a covered platform (as in Google) to remit a … payment to each eligible digital journalism provider … The … payment would be a percentage, as determined by a certain arbitration process, of the covered platform's advertising revenue generated during that quarter."
History of dispute
A bit of history provides context. Google launched Google News in 2002
A bit of history provides context. Google launched Google News in 2002
Cyber Protection Magazine posted a long article about Google’s decision to start de-listing California-based newspapers. We strove to be as objective as possible and present both sides of the argument, but we did say that the opponents were missing the point, hoping that the point would be obvious in the discussion. Here, however, we want to shed objectivity and make the point clear.
Google’s move, generously described, is a preemptive response to California’s Journalism Preservation Act (AB 886) that has yet to pass the Senate. The act will require Google to sit down and negotiate with California publishers over the fair price of publishing content from those media sites.
Note that the bill is not mandating a price. It is mandating a negotiation. That changes the nature of the discussion.
For any cybersecurity or data protection strategy to succeed, organisations need to rely on strong internal collaboration and communication processes. In particular, the CIO/CISO dynamic can have a significant impact on both short- and long-term decision making, from strategic investment decisions to leading the response to security incidents.