Risk Management

Risk Management | News, how-tos, features, reviews, and videos

CSO slideshow - Insider Security Breaches - Futuristic car technology races along a binary highway
businessman bridges gap

open door with sunlight shining through

New strategic vision needed to thrive as a digital enterprise

Is digital transformation really a revival of classic laissez-faire economics?

futuer blast hyper drive matrix

Digital resilience – a step up from cybersecurity

We are living in an increasingly digital world, but many organizations are still unaware of the extent to which they rely on digital technology and the risks that come with it. As we head towards a digitally dependent future, the need...

cyber terrorism dynamite explosion blow up binary detinate

Can cyber insurance cover acts of cyber terrorism?

Cyber insurance policies do not typically cover physical destruction or loss of life, but the UK government-backed reinsurer, Pool Re, announced this year it will cover acts of cyber officially deemed "terrorism" by Her Majesty's...

abstract data statistics

Redefining threat prediction

Security is hard. Some say once we can predict threats all will be better. Should we believe? Maybe. But security teams need to demystify the concept of “threat prediction” by addressing three common misunderstandings, and move their...

risk assessment gauge

Kenna Security takes a data-driven approach to risk analysis

Risk from security threats is relative to each company. Kenna Security leverages company and public data to pinpoint the real risk for each customer.

risk assessment - safety analysis - security audit

How to perform a risk assessment: Rethinking the process

New regulations and a changing threat landscape mean you need a different approach to your security risk assessment process.

insurance policy

Does cyber insurance make us more (or less) secure?

Underwriting cyber risk remains more art than science, but in the absence of regulation, cyber insurance might still be the best hope for improving cybersecurity practices across the board — at least for now.

multiple-exposure image - a businessman, a team at a laptop, and data connections against a skyline

Third-party risk: it’s the second hop you should fear

Third-party risk is a persistent fear for CISOs and risk compliance officers especially, with GDPR potentially piercing corporate non-disclosure agreements. Loss of sensitive data from a third party is often managed using protective...

risk assessment gauge

The enterprise-wide appeal of Business Risk Intelligence

Use cases demonstrate the enterprise-wide appeal of Business Risk Intelligence (BRI).

medical heart rate monitor ekg hospital

5 tips to thwart medical device attacks

Medical devices can be an easy gateway for hackers to steal valuable information. This advice will lower the risk of that happening.

17 critical

Redefining mission critical systems in the world of analytics-driven security

How should security operations determine what systems require the most attention?

Atlanta skyline

Atlanta's recovery highlights the costly mistake of being unprepared

The Samsam attack against the city of Atlanta in March was chaotic and crippling. The ransomware, named for the group responsible for development and deployment, left the city scrambling to deal with critical systems that were forced...

security trust

Charter Communications, who can you trust?

Charter Communications, its union, its customers and the New York attorney general all are experiencing trust issues.

security incident responders life preservers

Two incident response phases most organizations get wrong

It's important to remember: Incident response isn't a thing, it's a process.

The U.S. Capitol building in Washington

No Congressional background check for IT contractor charged with fraud

Imran Awan was an IT contractor to members of Congress, with access to their email servers, yet not even a basic background check was conducted.

marionette social engineering

Social engineering: It's time to patch the human

Is there a patch for human stupidity? If you believe the common saying, there isn't. However, Jayson E. Street says there is, and it's time companies started patching their humans. The truth is, technology alone isn't going to save...

RSA conference 2017

RSA Conference: CISOs' top 4 cybersecurity priorities

When cybersecurity executives head to the RSA Conference, they will be looking for information about threat intelligence, SOAPA, business risk, and changing security perimeters.

CSO slideshow - Insider Security Breaches - A briefcase of binary code, wind turbines on the horizon

The theft of tea leaves and the evolution of cyber espionage prevention

All companies, big and small, are trying to figure out how to secure important data — the trade secrets. Lucky for us, it might come down to something as simple as being human.

Load More
You Might Also Like