cyber risk

The role of trust in security: Building relationships with management and employees
Massive data breaches have become the new reality, and they confirm that one of the biggest challenges companies face when it comes to security: a company’s biggest …

CISOs are feeling less confident than ever about cyber risk and data security
Chief Information Security Officers are feeling less confident than ever about cyber-risk and data security this year, according to a survey conducted by Ponemon Institute in …

Examining attitudes towards confidential data
Industry analyst firm Quocirca surveyed 500 IT decision makers in the United States, Canada, United Kingdom, Australia and Japan, examining attitudes towards the value of …

To protect your network, you must first know your network
A sobering statistic regarding commonly used security controls was highlighted in a recent report. “Software and hardware inventory and valuation” was the least …

Not everything is sophisticated, let’s keep it simple
I don’t have dandruff. But if I did, then I could use a new sophisticated formula to cure my condition. Whether the problem is dandruff or a malware-related threat, the term …

Six data security questions that every board needs to ask
As data breaches become a constant headline, data security should be a major concern for company boards everywhere. Unless a board member has been hired specifically to …

Measuring fraud trends across various industries
Businesses across industries are experiencing more sophisticated fraud attempts across multiple customer-not-present channels, according to IDology. Shifting fraud tactics and …

Digital transformation and the loss of security control
Unpatched web infrastructure and de-centralised web management practices are leaving UK organisations vulnerable to cyber-attacks and high profile data breaches. New RiskIQ …

As GDPR implementation date approaches, cyber risk gets more attention
The upcoming implementation of the European Union’s General Data Protection Regulation (GDPR), which takes effect in May 2018, has elevated cyber risk to the top of the …

Why wait to be breached? Three reasons to secure your data now
“I’m working on it.” “We don’t have room in this year’s budget.” “Something else more important came up.” “Well, we’ve not been …

Four ways colleges can strengthen their cybersecurity programs
If breaches can’t be entirely blocked, what can IT professionals in higher education do to prevent these kinds of disaster scenarios? The GovEd team at Logicalis US says …

Outdated vendor systems leaving finance industry at risk
BitSight data scientists found that in most cases, companies in the finance industry supply chain are not meeting the same security standards that finance companies hold for …
Featured news
Resources
Don't miss
- Avoiding vendor lock-in when using managed cloud security services
- The CISO’s dilemma of protecting the enterprise while driving innovation
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence