risk management
Six data security questions that every board needs to ask
As data breaches become a constant headline, data security should be a major concern for company boards everywhere. Unless a board member has been hired specifically to …
Risk assessment: The first step in improving cyber security
Despite the proliferation of high profile cyber-attacks over the last 18 months, many organisations are still too disorganised in their approach to security. While it is no …
Is trading resilience for business growth a smart strategy?
Not long ago, the probability of a threat materializing was enough to open the IT pocketbook. Today, the mentality has shifted from one of risk prevention to one of risk …
Third-party risk management: Moving toward centralized, automated systems
While concerns about third-party risk remain high – particularly regarding cyber security – 58% of organizations ranked their programs as maturing or advanced, according to …
Should non-security functions get more involved in cybersecurity?
According to a survey conducted by Dimensional Research, 100 percent of respondents believe soft skills are important when hiring for their security teams. The three most …
Why wait to be breached? Three reasons to secure your data now
“I’m working on it.” “We don’t have room in this year’s budget.” “Something else more important came up.” “Well, we’ve not been …
Four ways colleges can strengthen their cybersecurity programs
If breaches can’t be entirely blocked, what can IT professionals in higher education do to prevent these kinds of disaster scenarios? The GovEd team at Logicalis US says …
Outdated vendor systems leaving finance industry at risk
BitSight data scientists found that in most cases, companies in the finance industry supply chain are not meeting the same security standards that finance companies hold for …
European banks at mercy of US regulators
European banks are under disproportional enforcement pressure from US regulators. Since 2012, of the $38.4bn levied in economic crime fines worldwide, 97 percent of all fines …
Insurers increasingly concerned about silent cyber exposure
Around half of industry practitioners see the risk of silent cyber exposure – potential cyber-related losses due to silent coverage from insurance policies not specifically …
The real cost of alarm fatigue
One of the toughest challenges for an IT security team is managing and sifting through the deluge of security alerts that are created on a daily basis. Teams can waste …
Where does corporate cloud security responsibility begin and service provider responsibility end?
Security has, is and will continue to be the cornerstone of advancement in the digital age. Conditions of trust, real or expected, are essential for digital economies to grow …
Featured news
Sponsored
Don't miss
- Applying DevSecOps principles to machine learning workloads
- Overcoming GenAI challenges in healthcare cybersecurity
- 25 cybersecurity AI stats you should know
- Hackers backdoored Cisco ASA devices via two zero-days (CVE-2024-20353, CVE-2024-20359)
- PoC for critical Progress Flowmon vulnerability released (CVE-2024-2389)