Big data and insurance: Implications for innovation and privacy
The use of big data analytics in insurance offers societal benefits, as improved understanding of risks can inform risk reduction and enhance insurability. However, …
Cyber resiliency: Risks organizations take every day
77 percent of respondents to a study conducted by Ponemon Institute admit they do not have a formal cyber security incident response plan (CSIRP) applied consistently across …
Best practices to tackle challenges posed by digital twins
Forty-eight percent of organizations that are implementing the Internet of Things (IoT) said they are already using, or plan to use digital twins in 2018, according to …
Even with cloud providers implementing defenses, glaring weaknesses remain
A new report from RedLock offers a look at the threats and vulnerabilities that continue to mount in public cloud computing environments. Account compromises keep rising Poor …
Global cyber risk perception: Highest management priorities
Few organizations are highly confident in their ability to manage the risk of a cyber-attack, despite viewing cybersecurity as a top risk management priority, according to a …
GDPR quick guide: Why non-compliance could cost you big
If you conduct business in the EU, offer goods or services to, or monitor the online behavior of EU citizens, then the clock is ticking. You only have a few more months …
Why do we need a risk-based approach to authentication?
20 years ago, everyone worked at a desktop workstation hardwired into an office building. This made network security simple and organizations felt they could depend on the …
Here’s what keeps your CISO up at night
89.1 percent of all information security leaders are concerned about the rise of digital threats they are experiencing across web, social and mobile channels, according to the …
Tackling the insider threat: Where to start?
Many organizations still believe the definition of an insider threat is limited to a rogue employee purposefully leaking embarrassing information, or nuking a couple of …
What CISOs prioritize in order to improve cybersecurity practices
In a new study by the The Financial Services Information Sharing and Analysis Center (FS-ISAC), CISOs weighed in on the most critical cyber-defense methods, frequency of …
How to ensure your IT and security teams stay aligned amid digital transformation
Even for sensitive industries, the movement to cloud-based technologies is generally accepted as a cost-effective and efficient infrastructure strategy and immediate priority. …
Worldwide spending on blockchain services to reach $8.1 billion in 2021
Interest and investment in blockchain as an emerging technology is accelerating as firms seek secure, sequential, and immutable solutions to improve business processes, enable …
Featured news
Resources
Don't miss
- SafeLine: Open-source web application firewall (WAF)
- Securing AI’s new frontier: Visibility, governance, and mitigating compliance risks
- Veeam plugs serious holes in Service Provider Console (CVE-2024-42448, CVE-2024-42449)
- Whitepaper: 9 traits of effective cybersecurity leaders of tomorrow
- Phishers send corrupted documents to bypass email security