risk management
![open source](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094431/open-400x200.png)
Open source security: The risk issue is unpatched software, not open source use
Many of the trends in open source use that have presented risk management challenges to organizations in previous years persist today. However, new data also suggest that an …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112909/user-400x200.jpg)
Where data privacy executives plan to focus their strategies and budgets
Adapting to an increasingly volatile regulatory environment is the top priority for privacy executives, with only approximately four in 10 confident in their current abilities …
![stop](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094545/stop-400x200.jpg)
The foundation: Quantifying risk with focused security measurement
When you hear “quantify risk,” you might think it’s the buzz-term du jour. You might be right. Risk quantification is a hot topic right now. It seems everyone who touches …
![credit card](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094629/creditcard-400x200.jpg)
Banks continue to prioritize risk management over customer convenience
Almost three in four banks in Asia Pacific anticipate that fraud in their country will increase in 2019, according to a recent poll by FICO. Of specific concern are …
![fire](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102515/fire-400x200.jpeg)
77% of orgs lack a cybersecurity incident response plan
How prepared are organizations when it comes to withstanding and recovering from a cyberattack? The fourth annual benchmark study on Cyber Resilience by IBM Security and the …
![meeting room](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111753/meeting_room-400x200.jpg)
Vendor risk management programs are running harder just to stay in place
Increasing pressures in the risk and regulatory environments continue to pose severe challenges to third-party vendor risk management (VRM) programs, a recent survey by …
![bulb](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102734/bulb-400x200.jpg)
Insights gained from working on more than 750 cybersecurity incidents
Many entities face the same security risks so it is essential to have an insight on how to manage them and respond in case of occurrence. BakerHostetler’s privacy and data …
![strategy](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111027/strategy-400x200.jpg)
As fraud attacks grow more sophisticated, a need for contextual detection strategies increases
Fraudsters are using a complex array of tools to build armies of fake accounts, 74% of all fraudulent accounts are created from desktops, and cloud service provider IP ranges …
![risk](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112759/risk-400x200.jpg)
Current and emerging third-party cyber risk management approaches and challenges
Managing third-party cyber risk is critical for businesses, but a lack of continuous monitoring, consistent reporting, and other blind spots are creating challenges that could …
![risk](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105446/risk-400x200.jpg)
Third-party cyber risk management is a burden on human and financial resources
Organizations and third parties see their third-party cyber risk management (TPCRM) practices as important but ineffective. There are four major takeaways for key decision …
![finance](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095930/finance-400x200.jpg)
CFOs and CIOs must collaborate on digital transformation to remain competitive
CFOs are shifting their priorities from cutting costs to rapidly investing in technology and data. Significant percentages of senior financial executives currently implement …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105618/cloud-400x200.jpg)
How cloud storage providers can preempt cyber attacks with business continuity
Cloud storage is now an integral part of almost every enterprise infrastructure and, as a result, security has become one of the most crucial elements of any cloud storage …
Featured news
Sponsored
Don't miss
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)