Archive for Cybersecurity Leader
Juice jacking is when hackers steal personal information from people as they charge their devices at public charging stations. From airports to cafes, learn how to keep your devices safe no matter where you work.
The recent shutdown of Silicon Valley Bank (SVB) has opened significant opportunity for cyber attackers to exploit the situation and target SVB account holders, their customers, and suppliers.
Password vault software vendor LastPass revealed that customer password vaults were stolen in a recent breach. It’s important for all LastPass users to take the following actions to protect themselves.
Cybersecurity insurance companies are expecting more sophisticated security processes from firms. With Agio’s XDR and EDR, you can exceed their expectations.
Agio’s Cybersecurity 360 Governance Program takes you from checking the box for regulation’s sake to holistic protection of your people, systems, and data. Because when you’re secure, you’re compliant.
No vendor relationship is without risk. Use this cybersecurity checklist to ensure your vendors meet both your firm’s and the SEC’s latest security standards.
The spyware compromised the features people use most—hackers could access messages, intercept calls, access the camera, and use the phone as a remote listening device.  Learn about Apple’s new feature called “Lockdown Mode/”
Sometimes a cybersecurity emergency can feel like a battleground — and nobody wants to enter a war zone without a game plan. Learn more about preparing for cybersecurity tabletop exercises with our experts.
Here are some key takeaways from our recent webinar about the U.S. Securities and Exchange Commission’s newest cybersecurity proposal.
The 2022 Hedge Fund Cybersecurity Trends Report captures the perceptions of cybersecurity programs, readiness, and initiatives from 100 hedge fund practitioners.
The financial industry has strict cybersecurity regulations in place to protect customers. Use this checklist to stay within regulations, prevent cyberattacks, and reassess vulnerabilities.
The Internet of Things introduced many new possibilities for businesses, along with security risks. Learn about managing them for a secure network environment!