Please turn on your JavaScript for this page to function normally.
magnifying glass
Shifting the burden: Long-term magnifying consequences

Computer geeks love their acronyms. Here’s one more: TANSTAAFL. There ain’t no such thing as a free lunch. No, I’m not talking about the grilled Alaskan salmon meal you …

bomb
Most organizations suffered a business-disrupting cyber event

A study conducted by Ponemon Institute found that 60 percent of organizations globally had suffered two or more business-disrupting cyber events — defined as cyber attacks …

healthcare
The current state of cybersecurity in the connected hospital

Abbott and The Chertoff Group released a white paper that shares key findings from a recent study of 300 physicians and 100 hospital administrators on cybersecurity challenges …

risk
Don’t accept risk with a pocket veto

We who live risk management know there are four responses when confronted with a credible risk to our organizations. We can treat the risk to reduce it. We can avoid the risk …

Users lock
Third parties: Fast-growing risk to an organization’s sensitive data

The Ponemon Institute surveyed more than 1,000 CISOs and other security and risk professionals across the US and UK to understand the challenges companies face in protecting …

connections
Only 14% have complete organizational awareness of IoT threats

86 percent of IT and security decision makers across the globe believe their organization needs to improve its awareness of IoT threats, according to Trend Micro. This …

analysis
CFO: Disrupting, taking control, and turning data into value

Chief financial officers (CFOs) at banks and insurance companies are playing a growing role in digital transformation by leveraging new data and analytic technologies and by …

traffic
DevOps and security: How to make disjointed security and DevOps teams work effectively

As organizations build their “software factories”, leveraging the latest DevOps organizational models and CD/CI techniques to get applications out quickly, they still find …

industry
Many water and energy systems vulnerable to significant cyber risk

New Trend Micro research revealed how exposed human machine interface (HMI) systems in thousands of critical water and energy organizations around the world could be …

businessman
Wider breach awareness fosters more security conversations

Focal Point Data Risk released the second annual Cyber Balance Sheet Report, a closely watched research study using in-depth surveys and interviews of corporate board members …

professional
Top data and analytics risks that will concern audit executives in 2019

Risks surrounding data and analytics are the primary concerns of chief audit executives (CAEs) for 2019, according to Gartner. Based on a survey of 144 CAE clients, Gartner …

puzzle
Why you should take an operational approach to risk management

Combining two seemingly unrelated entities to make a better, more useful creation is a keystone of innovation. Think of products like the clock radio and the wheeled suitcase, …

Don't miss

Cybersecurity news