Risk Management

Risk Management | News, how-tos, features, reviews, and videos

network security concept
virus specimen / world map / binary code

data analytics / risk assessment / tracking data or trends

Risk profiling gives PPD real-time view of vulnerabilities

How drug development company PPD built its own risk profiling tool to give all stakeholders a simpler, clear view of risk associated with every IT asset.

CSO slideshow - Insider Security Breaches - Futuristic car technology races along a binary highway

Tesla insider with expired NDA spills the tech beans

A former Tesla engineer with an expired non-disclosure agreement (NDA) shared inside technical information on an obscure forum, which was quickly shared across multiple social media platforms.

businessman bridges gap

Do you know your gap?

Understanding risk exposure and security control inconsistencies is one of the most important aspects of a business’s security program. While this process may seem complicated at first glance, by following these steps, CISOs can more...

open door with sunlight shining through

New strategic vision needed to thrive as a digital enterprise

Is digital transformation really a revival of classic laissez-faire economics?

futuer blast hyper drive matrix

Digital resilience – a step up from cybersecurity

We are living in an increasingly digital world, but many organizations are still unaware of the extent to which they rely on digital technology and the risks that come with it. As we head towards a digitally dependent future, the need...

cyber terrorism dynamite explosion blow up binary detinate

Can cyber insurance cover acts of cyber terrorism?

Cyber insurance policies do not typically cover physical destruction or loss of life, but the UK government-backed reinsurer, Pool Re, announced this year it will cover acts of cyber officially deemed "terrorism" by Her Majesty's...

Overall impact of COVID-19

Redefining threat prediction

Security is hard. Some say once we can predict threats all will be better. Should we believe? Maybe. But security teams need to demystify the concept of “threat prediction” by addressing three common misunderstandings, and move their...

risk assessment gauge

Kenna Security takes a data-driven approach to risk analysis

Risk from security threats is relative to each company. Kenna Security leverages company and public data to pinpoint the real risk for each customer.

risk assessment - safety analysis - security audit

How to perform a risk assessment: Rethinking the process

New regulations and a changing threat landscape mean you need a different approach to your security risk assessment process.

insurance policy

Does cyber insurance make us more (or less) secure?

Underwriting cyber risk remains more art than science, but in the absence of regulation, cyber insurance might still be the best hope for improving cybersecurity practices across the board — at least for now.

multiple-exposure image - a businessman, a team at a laptop, and data connections against a skyline

Third-party risk: it’s the second hop you should fear

Third-party risk is a persistent fear for CISOs and risk compliance officers especially, with GDPR potentially piercing corporate non-disclosure agreements. Loss of sensitive data from a third party is often managed using protective...

risk assessment gauge

The enterprise-wide appeal of Business Risk Intelligence

Use cases demonstrate the enterprise-wide appeal of Business Risk Intelligence (BRI).

medical heart rate monitor ekg hospital

5 tips to thwart medical device attacks

Medical devices can be an easy gateway for hackers to steal valuable information. This advice will lower the risk of that happening.

17 critical

Redefining mission critical systems in the world of analytics-driven security

How should security operations determine what systems require the most attention?

Atlanta skyline

Atlanta's recovery highlights the costly mistake of being unprepared

The Samsam attack against the city of Atlanta in March was chaotic and crippling. The ransomware, named for the group responsible for development and deployment, left the city scrambling to deal with critical systems that were forced...

security trust

Charter Communications, who can you trust?

Charter Communications, its union, its customers and the New York attorney general all are experiencing trust issues.

security incident responders life preservers

Two incident response phases most organizations get wrong

It's important to remember: Incident response isn't a thing, it's a process.

The U.S. Capitol building in Washington

No Congressional background check for IT contractor charged with fraud

Imran Awan was an IT contractor to members of Congress, with access to their email servers, yet not even a basic background check was conducted.

Load More
You Might Also Like