risk management

Incorporating sensitive asset data into your vulnerability and compliance program
In this podcast recorded at Black Hat USA 2018, Tim White, Director of Product Management, Policy Compliance at Qualys, talks about the importance of incorporating …

Cloud computing remains top emerging business risk
Cloud computing ranks as the top risk concern for executives in risk, audit, finance and compliance, according to the latest survey by Gartner. In Gartner’s latest quarterly …

Six best practices to follow in access control
Finding the right access control for your organization is best done in stages. In this way, you’ll be able to foresee costs and activities that you must tackle both on …

How rogue data puts organisations at risk of GDPR noncompliance
The GDPR compliance deadline came in by force on 25th May 2018 and applies to all organisations processing and holding the personal information of data subjects. This includes …

Not enough CISOs and business leaders cooperate on a cybersecurity plan and budget
With the proliferation of more and more sensitive data, expanding connectivity, and the adoption of automated processes, new research from Accenture reveals that C-suite and …

Top six security and risk management trends
Business leaders are becoming increasingly conscious of the impact cybersecurity can have on business outcomes. Gartner said that security leaders should harness this …

How security leaders can be empowered to drive results
The overwhelming demands on security leaders today can have a paralyzing effect. Gartner analysts provided guidance to security and risk leaders and practitioners on how to be …

Rising concerns about managing risk and proving compliance in the medical device industry
Perforce Software released the results of a global survey of medical device professionals. Key findings show increased concerns for mitigating risk and proving compliance …

The importance of threat intelligence and vulnerability remediation prioritization
In this podcast recorded at RSA Conference 2018, Jimmy Graham, Director of Product Management, Vulnerability Management at Qualys, talks about the importance of threat …

Solving the dark endpoint problem with increased visibility and control
In this podcast recorded at RSA Conference 2018, Richard Henderson, Global Security Strategist at Absolute Software, and Todd Wakerley, EVP of Product Development at Absolute …

Expand vulnerability and risk management programs to eliminate security misconfigurations
In this podcast recorded at RSA Conference 2018, Tim White, Director of Product Management, Policy Compliance at Qualys, discusses how expanding vulnerability and risk …

How security researchers deal with risks stemming from their activities
Broad and inconsistent interpretations of behind the times laws, new anti-infosec legislation, lawsuits and criminal prosecutions are having a chilling effect on security …
Featured news
Resources
Don't miss
- Microsoft introduces protection against email bombing
- Sudo local privilege escalation vulnerabilities fixed (CVE-2025-32462, CVE-2025-32463)
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it