cyber risk

Top concerns for audit executives? Cyber risks and data governance
As organizations continue to collect customer and employee data, chief audit executives (CAEs) are increasingly concerned about how to govern and protect it. Gartner conducted …

SIEM complexity and cloud visibility put companies at risk
Nearly half of companies are unable to remediate insider threats until after data loss has occurred, a Gurucul survey reveals. The study found that lack of visibility into …

Defining risk controls that actually work
Previously, we looked at practical ideas for conducting the complex information security risk assessments that all enterprises should regularly perform. The right methodology …

Companies should disclose cybersecurity risk management efforts
Research finds that when one company experiences a cybersecurity breach, other companies in the same field also become less attractive to investors. However, companies that …

How has your organization’s risk level changed in the past 12 months?
More than half of risk professionals worldwide say their organization’s risk levels have increased in the past 12 months, according to new research from ISACA, CMMI Institute …

Most decision makers expect AI and 5G to impact their cybersecurity strategy
An overwhelming majority of cybersecurity and risk management leaders believe that developments in 5G wireless technology will create cybersecurity challenges for their …

IaaS cloud vulnerabilities expected to increase 50% over 2018 figures
Although the total number of IaaS cloud vulnerabilities is still small and the technology relatively young, volumes are increasing year-over-year at a steady rate, an expected …

Could lighting your home open up your personal information to hackers?
Earlier this year Amazon’s Echo made global headlines when it was reported that consumers’ conversations were recorded and heard by thousands of employees. Now …

How to reduce the risk posed by vulnerabilities in IoT/ICS networks?
IoT/ICS networks and unmanaged devices are soft targets for adversaries, increasing the risk of costly downtime, catastrophic safety and environmental incidents, and theft of …

How the under 30s expect new approaches to cybersecurity
In today’s multigenerational workforce, the over-30s are more likely to adopt cybersecurity good practice than their younger colleagues who have grown up with digital …

As car manufacturers focus on connectivity, hackers begin to exploit flaws
Car manufacturers offer more software features to consumers than ever before, and increasingly popular autonomous vehicles that require integrated software introduce security …

New data analysis approach could strengthen the security of IoT devices
A multi-pronged data analysis approach that can strengthen the security of IoT devices, such as smart TVs, home video cameras and baby monitors, against current risks and …
Featured news
Resources
Don't miss
- Critical SAP NetWeaver flaw exploited by suspected initial access broker (CVE-2025-31324)
- Threat actors are scanning your environment, even if you’re not
- GoSearch: Open-source OSINT tool for uncovering digital footprints
- Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)
- Top must-visit companies at RSAC 2025