Please turn on your JavaScript for this page to function normally.
hand
Five proven techniques for building effective fraud management

Effective management of fraud has long been a vital capability within organizations, and for good reasons. According to the Association of Certified Fraud Examiners’ …

collaboration
How collaboration between IT pros and senior leaders could drive the future of risk mitigation

What is an acceptable level of risk for IT pros and their organizations? The answer to this question has changed in recent years, with the threat landscape shifting …

click
Cybercrime awareness heightened, yet people still engage in risky online behaviors

76% of Americans recognize that data breaches are serious, showing a high awareness that may be driven by news of major consumer, enterprise, and infrastructure breaches over …

idea
Three areas legal leaders should focus their technology efforts in

As legal and compliance teams have faced acute pressures since the global pandemic and are struggling to manage their workload, legal leaders should focus their technology …

collaboration
Third-party risk prevention strategies inadequate despite organizations being aware of the threats

While organizations recognize third-party threats expose them to great risk, many organizations fail to take adequate measures to mitigate it. In fact, while they grapple with …

Biohazard
Ransomware attacks on healthcare organizations may have life-or-death consequences

Ponemon Institute surveyed 597 IT and IT security professionals to understand how COVID-19 has impacted how healthcare delivery organizations (HDOs) protect patient care and …

certificate
Certificates volume growing, most enterprises considering PKI automation to reduce risks

The typical enterprise manages over 50,000 publicly and privately trusted PKI certificates, a DigiCert survey shows. Manually managing this volume of certificates can lead to …

connection
Assessing subsidiary risk a top priority for most enterprises, yet they still lack proper visibility

Most enterprises are overconfident and lack the proper visibility to manage subsidiary risk, according to an Osterman Research study. The study surveyed enterprises with more …

credit card
CNP transaction fraud costing merchants millions in revenue, fraudsters getting more sophisticated

Vesta released a report which includes an analysis of millions of digital transactions from the first quarter of 2020 through the first quarter of 2021 to track how CNP fraud …

password
Proper password security falling short despite increase in online presence

While 92 percent of people know that using the same password or a variation is a risk, 65 percent still re-use passwords across accounts, drastically increasing the risks to …

business
Corporate attack surface exploding as a result of remote work

74% of organizations attribute recent business-impacting cyberattacks to vulnerabilities in technology put in place during the pandemic. The data is drawn from a study of more …

danger
A multi-party data breach creates 26x the financial damage of single-party breach

Cyentia Institute and RiskRecon released a research that quantifies how a multi-party data breach impacts many organizations in today’s interconnected digital world. The study …

Don't miss

Cybersecurity news