2. The belief that system-cracking for fun and exploration is ethically OK as long as the cracker commits no theft, vandalism, or breach of confidentiality. Both of these normative ethical principles are widely, but by no means universally, accepted among hackers. Most hackers subscribe to the...
Join Mark McClain and Sumit Dhawan to understand the future of cybersecurity and how security teams can support CISO customers in the midst of uncertainty. Play podcast S1 : E1 Identity Matters with Ron Green, cybersecurity fellow at Mastercard ...
In an interesting court case between rental car giant Hertz and international consulting firm Accenture, claims were filed that one party is in breach of contract. John uses this case to show how even small-shop independent consultants should carry some sort of liability insurance. Editorials Legali...
Drawing on previous empirical work and analysis of firm incentives, it suggests two modest conclusions about the most efficacious legal structures: 1) that any disclosure-based regulation should be part of a broader cybersecurity re...
With the majority of small firms moving online during the pandemic, opportunistic cyber criminals have also stepped up their efforts to target them. The Government’s recent Cyber Security Breaches survey found that almost half of all UK small businesses suffered a cyber security breach or attack ...
Yet even if the centralised NHS England Cyber Security Operations Centre (CSOC) notifies an individual organisation about a seriousthreat or breach, responsibility for containing it is borne by that organisation. This should focus CISOs’ minds on cyber-resilience andrapid incident response and ...
Organisations must start with a root-and-branch risk assessment to stave off cyber attacks and mitigate the risk of a successful breach to their activities, clients and reputations. Every actor in every organisation should be concerned about this and should work on the risk mapping scenarios. Once...
Join Mark McClain and Sumit Dhawan to understand the future of cybersecurity and how security teams can support CISO customers in the midst of uncertainty. Play podcast S1 : E1 Identity Matters with Ron Green, cybersecurity fellow at Mastercard ...
As Article 39 of UN Charter stipulates, the UN Security Council may authorize collective security operations when they conclude that there is a situation of "threat to the peace, breach of the peace, or act of aggression." Speaking from strict practicality reasons, however, such an authorization...
Investing in cyber-resilience should therefore be an open-and-shut case for CISOs to make. It’s not just about mitigating the immediatefinancial, operational and reputational risks that stem from serious security breaches. Resilience also provides the strong foundations ofcybersecurity on which ambiti...