Risk Management

Risk Management | News, how-tos, features, reviews, and videos

data analytics / risk assessment / tracking data or trends

cloud migration

The Complete Guide to Cloud Migration

A selection of real-world stories of enterprise cloud migrations, from all-in moves to key databases or applications.

it in the nhs

The Complete Guide to IT in the NHS

We delve inside the government's healthtech unit.

the state of enterprise security

The State of Enterprise Security

We analyse the state of cybersecurity within UK organisations including key threats, main investment areas, and what is driving the security agenda within the business.

it monitoring

The Complete Guide to IT Monitoring

We assess the monitoring software landscape, focusing on machine data analytics and application performance management (APM) vendors.

it skills

The Complete Guide to IT Skills

Find out more about the UK IT hiring landscape and how you can best take advantage of it.

CSO slideshow - Insider Security Breaches - Futuristic car technology races along a binary highway

Tesla insider with expired NDA spills the tech beans

A former Tesla engineer with an expired non-disclosure agreement (NDA) shared inside technical information on an obscure forum, which was quickly shared across multiple social media platforms.

businessman bridges gap

Do you know your gap?

Understanding risk exposure and security control inconsistencies is one of the most important aspects of a business’s security program. While this process may seem complicated at first glance, by following these steps, CISOs can more...

open door with sunlight shining through

New strategic vision needed to thrive as a digital enterprise

Is digital transformation really a revival of classic laissez-faire economics?

futuer blast hyper drive matrix

Digital resilience – a step up from cybersecurity

We are living in an increasingly digital world, but many organizations are still unaware of the extent to which they rely on digital technology and the risks that come with it. As we head towards a digitally dependent future, the need...

cyber terrorism dynamite explosion blow up binary detinate

Can cyber insurance cover acts of cyber terrorism?

Cyber insurance policies do not typically cover physical destruction or loss of life, but the UK government-backed reinsurer, Pool Re, announced this year it will cover acts of cyber officially deemed "terrorism" by Her Majesty's...

abstract data statistics

Redefining threat prediction

Security is hard. Some say once we can predict threats all will be better. Should we believe? Maybe. But security teams need to demystify the concept of “threat prediction” by addressing three common misunderstandings, and move their...

risk assessment gauge

Kenna Security takes a data-driven approach to risk analysis

Risk from security threats is relative to each company. Kenna Security leverages company and public data to pinpoint the real risk for each customer.

blockchain in the enterprise

The Complete Guide to Blockchain in the Enterprise

Find out more about blockchain in the context of enterprise deployments, how technology vendors are getting in on the action with fully managed Blockchain-as-a-Service options, tips for building a career around blockchain and some...

risk assessment - safety analysis - security audit

How to perform a risk assessment: Rethinking the process

New regulations and a changing threat landscape mean you need a different approach to your security risk assessment process.

insurance policy

Does cyber insurance make us more (or less) secure?

Underwriting cyber risk remains more art than science, but in the absence of regulation, cyber insurance might still be the best hope for improving cybersecurity practices across the board — at least for now.

multiple-exposure image - a businessman, a team at a laptop, and data connections against a skyline

Third-party risk: it’s the second hop you should fear

Third-party risk is a persistent fear for CISOs and risk compliance officers especially, with GDPR potentially piercing corporate non-disclosure agreements. Loss of sensitive data from a third party is often managed using protective...

risk assessment gauge

The enterprise-wide appeal of Business Risk Intelligence

Use cases demonstrate the enterprise-wide appeal of Business Risk Intelligence (BRI).

medical heart rate monitor ekg hospital

5 tips to thwart medical device attacks

Medical devices can be an easy gateway for hackers to steal valuable information. This advice will lower the risk of that happening.

Load More
You Might Also Like