Please turn on your JavaScript for this page to function normally.
insider threat
New GRC and cyber risk strategies emphasize risk adaptability

MetricStream has unveiled its annual forecast of key trends shaping the future of GRC and Cyber GRC. These 2025 predictions offer a roadmap for building resilience strategies, …

strategy
Cyber trends set to influence business strategies

Diligent convened a group of 65 board members, C-suite executives, and leading subject matter experts to explore topics shaping the future of business: generative AI, …

lock
Making the most of cryptography, now and in the future

Enterprise cryptography faces risks beyond just the advent of quantum computers. For starters, there is no guarantee that the traditional algorithms have not been broken. …

software
Why software is the key to FI risk management

Risk management is important, but it’s not always exciting. Many risk professionals still rely on spreadsheets and manual methods despite the availability of better options. …

identity
Machine identities are the next big target for attackers

86% of organizations had a security incident related to their cloud native environment within the last year, according to Venafi. As a result, 53% of organizations had to …

API security
API security blind spots put businesses at risk

Many customer-facing APIs remain unprotected, leaving businesses vulnerable to breaches. To address these threats, a comprehensive approach to API security, covering every …

money
46% of financial institutions had a data breach in the past 24 months

As the financial industry is the most targeted sector for data breaches in 2024, it’s now more important than ever to strengthen the industry moving into 2025, according to …

security
Overlooking platform security weakens long-term cybersecurity posture

Platform security – securing the hardware and firmware of PCs, laptops and printers – is often overlooked, weakening cybersecurity posture for years to come, according to HP. …

open-source software
70% of open-source components are poorly or no longer maintained

The geographic distribution of open-source contributions introduces geopolitical risks that organizations must urgently consider, especially with rising nation-state attacks, …

work
65% of office workers bypass cybersecurity to boost productivity

High-risk access exists throughout the workplace, in almost every job role, proving that the time has come for organizations to re-think the way they protect their workforce, …

AI
Using AI to drive cybersecurity risk scoring systems

In this Help Net Security video, Venkat Gopalakrishnan, Principal Data Science Manager at Microsoft, discusses the development of AI-driven risk scoring models tailored for …

AI
How human ingenuity continues to outpace automated security tools

10% of security researchers now specialize in AI technology as 48% of security leaders consider AI to be one of the greatest risks to their organizations, according to …

Don't miss

Cybersecurity news