Zobrazeno 1 - 10
of 30
pro vyhledávání: '"Sasha Romanosky"'
Although spending on cybersecurity continues to grow, companies, government agencies, and nonprofit organizations are still being breached, and sensitive personal, financial, and health information is still being compromised. This report sets out the
This report examines the portfolio of tools funded by the State Department's Bureau of Democracy, Human Rights, and Labor that help support Internet freedom and assesses the impact of these tools in promoting U.S. interests (such as freedom of expres
Publikováno v:
Management Research Review.
Purpose The purpose of this study is to examine how companies integrate cyber risk into their enterprise risk management practices. Data breaches have become commonplace, with thousands occurring each year, and some costing hundreds of millions of do
Autor:
Benjamin Boudreaux, Sasha Romanosky
Publikováno v:
International Journal of Intelligence and CounterIntelligence. 34:463-493
In a blog post in June 2016, the threat intelligence company CrowdStrike attributed the breach of the Democratic National Committee’s (DNC’s) networks to two groups of cyber actors closely linked t...
Publikováno v:
SSRN Electronic Journal.
Data breaches and security incidents have become commonplace, with thousands occurring each year, and some costing hundreds of millions of dollars. Consequently, cyber risk has become one of the gravest risks facing organizations, and has attracted b
Legal privacy scholarship has typically emphasized the various ways in which plaintiffs fail when bringing legal actions against entities when their personal information is lost or stolen. However, this scholarship is based on a limited set of publis
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1cb0f322a17a409fc43744bfae675271
Publikováno v:
Journal of Cybersecurity. 6
Despite significant innovations in IT security products and research over the past 20 years, the information security field is still immature and struggling. Practitioners lack the ability to properly assess cyber risk, and decision-makers continue t
Publikováno v:
Journal of Cybersecurity. 5
This article highlights how cyber risk dependencies can be taken into consideration when underwriting cyber-insurance policies. This is done within the context of a base rate insurance policy framework, which is widely used in practice. Specifically,
Despite the massive investments in information security technologies and research over the past decades, the information security industry is still immature. In particular, the prioritization of remediation efforts within vulnerability management pro
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9d9da7ff1061e2bb869418b414389a8b