Almost overnight COVID-19 upended our everyday reality. A risk that we didn’t even know we faced took center stage both personally and professionally. In this post, we look at what’s driving cyber risk mitigation decisions today—including what’s very different from what we heard on January 1—and how cybersecurity priorities are coming to the forefront.
Using Data t [...]Keep Reading
Nehemiah Security recently released version 3.4 of Risk Quantifier™, our software that automates an enterprise’s financial risk model of cyber attacks. Although this is not considered a major release, I think I might be more excited about this release than any prior version.
You might be asking, why does a point release cause such excitement? What’s so special about [...]Keep Reading
Protect Your Balance Sheet from Cyber Attacks
Cyber risks are now a certainty. Firms, in every industry and of every size, should be managing these risks as much as (if not more than) all other risks to their business: economic, competitive, operational, etc. More than 40 percent of respondents to the Marsh-Microsoft 2019 Global Cyber Risk Perception Survey believed they cou [...]Keep Reading
What does getting started with RQ really look like? How long does it take to get fully implemented? This and many other questions may be circulating in your mind as you decide how to plan on moving forward with our tool if you just purchased it or what that engagement MIGHT look like if you are considering buying. In this blog, we want to walk you through an approximate timelin [...]Keep Reading
Gartner’s new article, 8 Reasons More CEO’s Will Be Fired Over Cybersecurity Incidents, sheds light on a handful of critical challenges CEOs have when managing cybersecurity. It is a compelling read, one that led me to wonder, does this have to be the reality? Is there something we can do to change this course?
These are heavy, complex questions. And, they will be differ [...]Keep Reading
The Payment Card Industry-Data Security Standard (PCI DSS) has been around for many years. Regardless, we think it is worthwhile to review the history of PCI and explore current and future developments to better capitalize on the value-add of PCI.
PCI-DSS…a gleam in the eye of fraud mitigation
The PCI Compliance program began in the Payment Card Industry, which encompasses [...]Keep Reading
In this chapter, you will:
• Understand why cyber risk is a business problem
• Recognize the challenges of communicating cyber risk
• See why cyber risk analytics is a business imperative
“If no mistakes have you made, yet losing you are, a different game you should play.” ― Yoda.
It’s a vicious cycle.
Hacker motivations have risen to new levels and [...]Keep Reading
Nehemiah Security partnered with MightyGuides to interview seven industry experts with the mission of advancing the risk management conversation among cyber professionals. Each interviewee was posed the question, “If your friend was put in charge of measuring cyber risk at their company, what advice would you give them?”
Genady Vishnevetsky (chief information security of [...]Keep Reading
Below is a compilation of news articles covering some of the notable data breaches that occurred in February 2019. Doesn't this really put things into perspective?
Houzz resets user passwords after data breach - Feb 1
Parenting site Mumsnet hit by data breach - Feb 8
Experts comment on Aus Parliament breach - Feb 11
Major Security Breach Found in Hospital [...]Keep Reading
Don’t have time to read? Start listening to this blog post now:
In business, the name of the game is to make hard choices with the hope that the decision made will pay off. IT is not exempt from these difficult decisions. Originally coined in 1992 to address quick and dirty coding in software development, technical debt has evolved to “reflect the implied costs of ad [...]Keep Reading