Please turn on your JavaScript for this page to function normally.
Slack
Slack warns investors it might be targeted by organized crime, nation-state hackers

Slack Technologies, the company whose cloud-based collaboration tools and services are used by companies worldwide, has warned potential investors that the company faces …

user
Where data privacy executives plan to focus their strategies and budgets

Adapting to an increasingly volatile regulatory environment is the top priority for privacy executives, with only approximately four in 10 confident in their current abilities …

stop
The foundation: Quantifying risk with focused security measurement

When you hear “quantify risk,” you might think it’s the buzz-term du jour. You might be right. Risk quantification is a hot topic right now. It seems everyone who touches …

users
Underserved populations unaware of cybersecurity risks

Members of underserved populations are less likely to know whether they have even been victimized by a cyber attack, and they have lower awareness of cybersecurity risks. …

credit card
Banks continue to prioritize risk management over customer convenience

Almost three in four banks in Asia Pacific anticipate that fraud in their country will increase in 2019, according to a recent poll by FICO. Of specific concern are …

Headache
The top emerging risks organizations are facing

Gartner surveyed 98 senior executives across industries and geographies and found that “accelerating privacy regulation” had overtaken “talent shortages” as the top emerging …

bulb
Insights gained from working on more than 750 cybersecurity incidents

Many entities face the same security risks so it is essential to have an insight on how to manage them and respond in case of occurrence. BakerHostetler’s privacy and data …

risk
Current and emerging third-party cyber risk management approaches and challenges

Managing third-party cyber risk is critical for businesses, but a lack of continuous monitoring, consistent reporting, and other blind spots are creating challenges that could …

industry
Main threat source to industrial computers? Mass-distributed malware

Malicious cyber activities on Industrial Control System (ICS) computers are considered an extremely dangerous threat as they could potentially cause material losses and …

IoT
Security remains a top concern for IoT executives, but small fixes can shore up ecosystem resilience

66 percent of companies say their c-suite executives are supportive of their IoT implementation, but even with strong support they noted there are hurdles to overcome. A …

risk
Third-party cyber risk management is a burden on human and financial resources

Organizations and third parties see their third-party cyber risk management (TPCRM) practices as important but ineffective. There are four major takeaways for key decision …

ransomware
Weighing the options: The role of cyber insurance in ransomware attacks

The Norsk Hydro cyberattack is a real-time case study of what an international company goes through when a ransomware attack is successful. Over the last week, we’ve witnessed …

Don't miss

Cybersecurity news