cyber risk
Certificates volume growing, most enterprises considering PKI automation to reduce risks
The typical enterprise manages over 50,000 publicly and privately trusted PKI certificates, a DigiCert survey shows. Manually managing this volume of certificates can lead to …
Assessing subsidiary risk a top priority for most enterprises, yet they still lack proper visibility
Most enterprises are overconfident and lack the proper visibility to manage subsidiary risk, according to an Osterman Research study. The study surveyed enterprises with more …
CNP transaction fraud costing merchants millions in revenue, fraudsters getting more sophisticated
Vesta released a report which includes an analysis of millions of digital transactions from the first quarter of 2020 through the first quarter of 2021 to track how CNP fraud …
Proper password security falling short despite increase in online presence
While 92 percent of people know that using the same password or a variation is a risk, 65 percent still re-use passwords across accounts, drastically increasing the risks to …
Corporate attack surface exploding as a result of remote work
74% of organizations attribute recent business-impacting cyberattacks to vulnerabilities in technology put in place during the pandemic. The data is drawn from a study of more …
A multi-party data breach creates 26x the financial damage of single-party breach
Cyentia Institute and RiskRecon released a research that quantifies how a multi-party data breach impacts many organizations in today’s interconnected digital world. The study …
Implementing risk quantification into an existing GRC program
With a myriad of risks and limited security budgets, how do organizations decide which projects to prioritize? Many governance, risk management and compliance (GRC) …
Protecting IoT devices requires a DNS-based solution
IoT devices are fast becoming an everyday part of our lives. Whether it be in the role they play in manufacturing and industry or powering the appliances in our own homes, …
Consumers taking action to protect themselves online, though confidence is low
68% of consumers claim to be doing more to protect themselves from online fraud and identity theft than a year ago, according to a Trulioo research. The research found 76% of …
SaaS applications investment growing despite underutilization of app licenses by employees
Business investment in SaaS applications continues to climb despite widespread underutilization of app licenses by employees. According to Productiv’s report, on average only …
Leveraging AI and automation to identify sensitive data at scale
In this interview with Help Net Security, Apoorv Agarwal, CEO at Text IQ, talks about the risk of unstructured data for organizations and the opportunity to leverage AI and …
Microsoft Power Apps data exposure: Prioritizing sensitive data with secure configuration settings
Security misconfigurations are one of the most common gaps hackers look to exploit. One bad configuration setting in a popular cloud platform can have far-reaching …
Featured news
Resources
Don't miss
- European companies hit with effective DocuSign-themed phishing emails
- BeyondTrust fixes critical vulnerability in remote access, support solutions (CVE-2024-12356)
- CISO accountability: Navigating a landscape of responsibility
- Key steps to scaling automated compliance while maintaining security
- Vanir: Open-source security patch validation for Android