cyber risk

Chief Compliance Officers must embrace new leadership responsibilities
As demands on the compliance function grow more intense, Chief Compliance Officers (CCOs) must proactively embrace new leadership responsibilities for their role and …

Major threats to cloud infrastructure security include a lack of visibility and inadequate IAM
98% of companies had experienced at least one cloud data breach in the past 18 months compared to 79% last year, according to an IDC survey. Meanwhile, 67% reported three or …

An organization’s security posture will benefit from increased coordination
NAVEX Global released key findings from its survey of IT security professionals in the U.S. and U.K. on the collaboration between the IT and risk management functions. …

Unstructured data still overshared inside and outside organizations
The number of overshared files rose 450 percent compared to the same quarter in 2020, highlighting the significant impact of the pandemic and remote work on data security. …

Consumers neglecting mobile security despite growing number of threats
Over the past year, consumers have adapted to many changes, including the rapid shift towards a digital-first lifestyle. This has led to an emphasis on consumers dependence on …

Navigating the complexity of ransomware negotiations
Most ransomware attacks are opportunistic, and at the end of the day, cybercriminals do not discriminate. Nobody plans to fall victim, but the fact is any company with an …

USB threats could critically impact business operations
According to a report released by Honeywell, USB threats that can severely impact business operations increased significantly during a disruptive year when the usage of …

Many companies believe it is important to protect employee privacy, yet few are effective in doing so
DTEX Systems released a report which revealed a significant workforce privacy gap. The report, conducted by the Ponemon Institute, surveyed a global pool of 1,249 IT and IT …

Third-party identity risk management, compliance, or both?
Third-party risk management and compliance have traditionally gone hand-in-hand. One is a business requirement, the other a business necessity. So, which comes first? Or …

How SMBs are dealing with emerging threats
ECI Software Solutions released a report detailing the findings from a survey examining how SMBs are leveraging technology to respond to the various threats from the past year …

Most third-party libraries are never updated after being included in a codebase
79% percent of the time, third-party libraries are never updated by developers after being included in a codebase – despite the fact that more than two thirds of fixes …

What is the impact of remote work on security best practices?
Employees are now accessing resources from any device and from anywhere outside of their corporate domain, a JumpCloud survey reveals. The report details the impact of …