Stay on the cutting edge of cybersecurity's evolution and global insight! Subscribe to The Nexus for FREE today!

Tokenization: Your Secret Weapon for Data Security?

By David Close

The Nexus  |  11 Nov 2019

Consider this: 4.1 billion records have been compromised in the first half of 2019 alone, a 54% increase over the same period in 2018.1 Organizations in nearly every industry are facing an ever-growing and out-of-control cybersecurity crisis. Encryption is one of the most effective security...

Third-Party Risk Management Vs. Provider’s Accountability

By Antonio Ramos Garcia, CISA, CRISC, CISM, Jonah

The Nexus  |  11 Nov 2019

Lately, I have been reflecting on the need to assess third-party risk and how other business sectors have mitigated this risk in the past. I have concluded the origin for this need is what economists call a “market failure.” The first issue worth noting is that our need for third parties to...

Email Warning Banners: Are We Using Them Effectively?

By Rob Lelewski, CISA, CRISC, CISM, CCE, CIPM CISSP-ISSMP, EnCE, GCIH

The Nexus  |  14 Oct 2019

Being Warned: Every Day, Every Message Imagine walking out to your mailbox on a sunny day. Most of us can relate to eagerly awaiting a package containing the latest gadget that you bought online. You reach into the mailbox, leaf though the contents and are likely disappointed that your postal...

Securing Tomorrow: Investing in Digital Education

By Jonathan Brandt, CISM, CCISO, CFR, CISSP, CSA+, PMP

The Nexus  |  14 Oct 2019

Scan your favorite news sources and you will see frequently repeated words such as “breach,” “compromise,” “exposure,” “identity theft” and “hacker.” Headlines routinely highlight the impact (or potential impact) to critical infrastructure, economic prosperity, financial markets, etc. Since the...