Please turn on your JavaScript for this page to function normally.
chess
How to implement expedited security strategies during a crisis

Cybersecurity professionals know all too well that crises tend to breed new threats to organizational security. The current COVID-19 pandemic is evidence of this. Health …

remote work
Microsoft releases new encryption, data security enterprise tools

Microsoft has released (in public preview) several new enterprise security offerings to help companies meet the challenges of remote work. Double Key Encryption for Microsoft …

risk
Organizations need an agile response to unexpected risks

The average $5 billion company incurs delays of roughly 5 weeks per year in new product launches due to missed risks, with a $99 million opportunity cost, according to …

user
How to establish a threat intelligence program

Instituting an in-house cyber threat intelligence (CTI) program as part of the larger cybersecurity efforts can bring about many positive outcomes: The organization may …

IoT
As IoT devices evolve, risk management needs improvement

There’s an acute need for IoT risk management improvement, as most organizations do not know what tracking and safeguards their third parties have in place, according to …

industrial
Only 36% of critical infrastructures have a high level of cyber resilience

Greenbone Networks revealed the findings of a research assessing critical infrastructure providers’ ability to operate during or in the wake of a cyberattack. The cyber …

containers
How data intelligent organizations mitigate risk

Organizations that put data at the center of their vision and strategy realize a differentiated competitive advantage by mitigating cost and risk, growing revenue and …

money
Leveraging automation to maximize security budgets

With the economic impact of COVID-19 increasingly looking like an imminent recession and the way we do work altered perhaps forever, CIOs and CISOs will most likely be …

password
Passwords still widely used, despite known weaknesses

Nearly a third (29%) of organizations in Europe and the Middle East still see usernames and passwords as one of the most effective means to protect access to their IT …

Cyber-Risk Oversight 2020
Handbook: Cyber-Risk Oversight 2020

The Internet Security Alliance (ISA) and the European Confederation of Directors’ Associations (ecoDa) released Cyber-Risk Oversight 2020, a handbook on cyber-risk management …

shield
Application security: Getting it right, from the start

Security testing data is “the unsung hero” of securing application development. It’s the backbone of application development quality, compliance and risk management, and rests …

stop
Third-party risk is broken, businesses unprepared for supply chain disruptions

Many companies are not dedicating proper resources to assess third-party risks, and those that are still lack confidence in their programs, according to Prevalent. Supply …

Don't miss

Cybersecurity news