Please turn on your JavaScript for this page to function normally.
template
Third-party risk management programs still largely a checkbox exercise

Enterprise third-party risk management (TPRM) programs have been around for a half-decade or longer, and at this point most large organizations run one. However, many of these …

PCI
PCI SSC releases PCI Secure Software Lifecycle (SLC) Standard 1.1

The PCI Security Standards Council (PCI SSC) has published version 1.1 of the PCI Secure Software Lifecycle (SLC) Standard and its supporting program documentation. The PCI …

Cybersecurity risk management
Organizations can no longer afford a reactive approach to risk management

Board members and C-suite executives around the globe are most concerned in 2021 with risks associated with COVID-19-related government policies and regulations, economic …

digital transformation
IT leaders concerned about their ability to keep up with digital transformation

IT leaders have growing concerns about their ability to keep up with digital transformation, a Dynatrace survey of 700 CIOs reveals. Traditional IT operating models with …

drown
SOC analysts overloaded, but role more important than ever

Organizations are spending more to account for widespread security operation center (SOC) challenges including growing security management complexity, increasing analyst …

risk
Why you should make cyber risk a business gain, not a loss

As companies continue to respond to the global pandemic, millions of their employees are working remotely, often from home. While this is the recommended response, it’s also …

digital transformation
Organizations further along the digital transformation maturity spectrum have an advantage

Concerns around security, privacy, cloud and technology resilience are being further fueled by shifting business priorities, the pandemic-induced remote work environment and …

risk
More than half of organizations don’t have an insider risk response plan

Both business and security leaders are allowing massive insider risk problems to fester in the aftermath of the significant shift to remote work in the past year, according to …

Which security practices lead to best security outcomes?

A proactive technology refresh strategy and a well-integrated tech stack are, according to a recent Cisco report, two security practices that are more likely than many others …

lock
Retail CISOs and the areas they must focus on

In this interview, Matt Cooke, cybersecurity strategist, EMEA at Proofpoint, discusses the cybersecurity challenges for retail organizations and the main areas CISOs need to …

Cybersecurity risk management
The current state of third-party risk management

Third-party risk management (TPRM) professionals increasingly do not trust that security questionnaires provide sufficient information to properly understand and act on their …

risk
Challenges organizations face in combating third-party cyber risk

A CyberGRX report reveals trends and challenges organizations of all sizes face in combating third-party cyber risk today. Each insight was gleaned from proprietary assessment …

Don't miss

Cybersecurity news