<img src="https://ws.zoominfo.com/pixel/4CagHYMZMRWAjWFEK36G" width="1" height="1" style="display: none;">
Request Demo

Security Experts Comments:

George Wrenn, CEO at CyberSaint:

“Cyber defense will only evolve, and must evolve, with technology and the increasing risks we see in this heavily digital era. The key risk areas identified in this report- IoT, Social Media, Business Leadership- are evidence that digital risk management isn’t just a cybersecurity issue, and as many of us know, cybersecurity isn’t just a technical issue anymore.
Leadership that understands how to approach risk management on a continual basis, in a way that connects all business unity and not simply engages the cybersecurity unit, is key. Even better is implementing technology to help link relevant threats to live controls across business assets, which allows for prioritization, efficiency, effective remediation and therefore more resilience.”

Pravin Kothari, CEO at CipherCloud:

Pravin Kothari“Booz Allen’s new cyber report highlights key threat areas for 2019. Most interesting is the focus on internet of things (IoT) devices as a high risk area. The Booz Allen report brings focus to the open vulnerabilities in these devices. You may be aware that a recently passed California law SB-327 requires any manufacturer of an IoT device must ship with a unique password as of January 1, 2020. No more default passwords! As California goes, so goes the United States so this law will have broad impact. IoT devices are also very difficult to defend as most customers have no real visibility into IoT operations. Assuming malware or an attacker back-door has been detected, it is also almost impossible to clean the devices.
Another area the Booz Allen report highlights is that of information warfare leveraged by the power of social media and malign websites. Increasingly, nation-states and other entities use the power of social media to support information warfare campaigns. Social media can be deployed as a cannon of misinformation to damage corporate reputations, attack government institutions and their policies, attack individual politicians and organizations, and in general obfuscate the truth and confuse the public.”

This post originally appeared on Information Security Buzz, read the original post here

You may also like

Groundbreaking Executive Dashboard ...
on February 13, 2023

BOSTON--(BUSINESS WIRE)--CyberSaint, the leader in cyber risk management, today announced the release of its Executive Dashboard. CyberSaint is first-to-market with this new ...

CyberSaint STRONGER 2023 ...
on February 2, 2023

BOSTON--(BUSINESS WIRE)--CyberSaint, the leader in cyber risk management, today announced that the company is seeking speaker submissions for its virtual STRONGER conference, set ...

CyberSaint Partners With and ...
on October 5, 2022

BOSTON--(BUSINESS WIRE)--CyberSaint, the developer of the leading platform delivering cyber risk automation, today announced its CyberStrong platform is now Powered by Snowflake. ...

Booz Allen Hamilton and CyberSaint ...
on September 7, 2022

MCLEAN, Va. & BOSTON--(BUSINESS WIRE)--Booz Allen Hamilton (NYSE: BAH) and CyberSaint today announced a strategic partnership that aligns Booz Allen’s world-class ...

CyberSaint Continues to Support ...
on July 6, 2022

BOSTON--(BUSINESS WIRE)--CyberSaint, the developer of the leading platform delivering cyber risk automation, announced the addition of CMMC 2.0, allowing customers to adopt the ...

CyberSaint Makes FAIR Model ...
on June 28, 2022

BOSTON--(BUSINESS WIRE)--CyberSaint, the developer of the leading platform delivering cyber risk automation, announced the addition of the FAIR (Factor Analysis of Information ...