cyber risk
1 in 5 executives take risks with sensitive data to meet regulatory demands
The Anti-Money Laundering Directive (AML), the EU-US Privacy Shield and the Market Abuse Directive (MAD) and Regulation (MAR) are the three biggest regulatory pressures across …
Bad security habits persist, despite rising awareness
While 82 percent of respondents believe the IT security industry is making progress against cyber attacks, those gains are undercut by egregious security practices in critical …
Rio 2016: The world is watching, especially hackers
When each nation’s best athletes compete at the Olympic Games, one city seemingly becomes the center of the universe. And while we look on closely—captivated by the …
Nearly 1 in 3 consumers victimized by card fraud
Thirty percent of consumers globally have experienced card fraud in the past five years, according to ACI Worldwide and Aite Group. The global fraud study of more than 6,000 …
Cybersecurity risks in 3D printing
3D printing (i.e. additive manufacturing) is a $4 billion business set to quadruple by 2020. Additive manufacturing builds a product from a computer assisted design (CAD) file …
Risk analytics market to experience serious growth
The risk analytics market is estimated to grow from USD 16.55 billion in 2016 to USD 30.18 billion by 2021, at a Compound Annual Growth Rate (CAGR) of 12.8%, according to …
Boardroom execs still don’t know the value of data
Almost two thirds of businesses still don’t know the value of critical data assets being targeted by cybercriminals. IRM surveyed security heads at their recent conference, …
How many businesses will pay a ransom if attacked?
Some 84 percent of information technology executives at firms that had not faced ransom attacks said they would never pay a ransom. But among firms that had been attacked, 43 …
How CISOs can work with the C-suite to define the cybersecurity risk level
Defining the cybersecurity risk level for any organization should be a collaborative effort that balances the need for risk mitigation with fiscal responsibility. Although the …
Top 10 strategic technologies for government in 2016
After nearly a decade of “doing more with less,” government CIOs remain under pressure to further optimize IT and business costs while leading digital innovation …
Control system security compliance: Assess risk before it’s too late
Cybercrime is no longer a problem restricted to IT. The Department of Homeland Security recently warned that thousands of industrial control systems (ICS) can be hacked …
How executives really feel about infosec reports
More than half of IT and security executives will lose their jobs as a result of failing to provide useful, actionable information. While the majority of board members say …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)