Minimizing File Transfer Risk

Data Breach Today

Jeffrey Edwards of Progress Software on Ensuring Privacy File transfers are a significant factor in accidental insider risk. Jeffrey Edwards of Progress Software explains how secure file transfers can help ensure privacy and play a role in regulatory compliance

Risk 176

Third-Party Risk Management Essentials

Data Breach Today

Mark Sangster of eSentire Shares Lessons Learned Third-party vendor risk continues to pose a security challenge to organizations.

Risk 226

Risks of Password Managers

Schneier on Security

Stuart Schechter writes about the security risks of using a password manager. My particular choices about security and risk is to only store passwords on my computer -- not on my phone -- and not to put anything in the cloud. passwordsafe passwords riskassessment risks

OnDemand Webinar | Integrating Information Risk Management into Business Risk Management

Data Breach Today

Learn about trends in information security risk assessment that align with business risk.

Risk 163

Understanding Your Risk Surface

Data Breach Today

How can they best understand and mitigate their risks? Kelly White of RiskRecon on How to Track What's Being Missed In the expanded, virtual enterprise, security leaders face the challenge of defending an ever more complicated attack surface.

Risk 190

Security Risks of Chatbots

Schneier on Security

Good essay on the security risks -- to democratic discourse -- of chatbots. lies nationalsecuritypolicy propaganda risks

Risk 113

Third-Party Risk Management: The Pitfalls

Data Breach Today

Ryan Davis of Veracode Describes Common Mistakes, Outlines Effective Strategies Security practitioners often overlook the risks of third-party resources, says Ryan Davis of Veracode, who outlines the biggest potential pitfalls and describes effective risk management techniques

Risk 186

CISO Notebook: Third-Party Risk

Data Breach Today

Cris Ewell of UW Medicine on Managing Vendor Risks Where is the data, who has access to it, and how is it being secured? These are among the top questions inherent in any third-party risk program. Cris Ewell, CISO of UW Medicine, shares insight from his experience managing vendor risk

Risk 163

HHS Updates Security Risk Assessment Tool

Data Breach Today

Why Do So Many Entities Still Struggle with Security Risk Analysis? Many HIPAA enforcement actions taken by federal regulators have chastised organizations for their poor security risk assessments.

Risk 130

Medical Devices: Finding the Risks

Data Breach Today

Researcher Jesse Young on Efforts to Improve Device Security Recently, the FDA was forced to recall a series of insulin pumps because of cybersecurity vulnerabilities that could have left the devices open to hackers.

Risk 190

Managing Open Source Risks

Data Breach Today

But with increased speed comes greater risks, says Chris Eng of CA Veracode, who offers insights on mitigating those risks Chris Eng of CA Veracode on Best Practices Open source and third-party components help developers build and deploy applications faster.

Risk 182

Phishing: Mitigating Risk, Minimizing Damage

Data Breach Today

In Wake of Recent Incidents, Experts Offer Insights on Critical Steps to Take As phishing attacks continue to menace healthcare and other business sectors, security experts say organizations must take critical steps to prevent falling victim and help limit the potential damage

Insider Threat: Greater Risk Mitigation Required

Data Breach Today

Risk 130

The Costs and Risks of Account Takeover

Data Breach Today

These are the costs and risks associated with ATO What Can be Done About ATO Attacks? Account takeover (ATO) attacks result in billions of dollars of fraud and damage to brand reputation each year.

Risk 180

Responding to Threats Based on Business Risks

Data Breach Today

But how can organizations prioritize the threats and respond based on business risks? Craig Harber of Fidelis Cybersecurity on Addressing Emerging Threats Nation-state actors, cybercriminals, hacktivists - each of these adversaries poses threats to enterprises.

Risk 180

How to write an ISO 27001-compliant risk assessment procedure

IT Governance

ISO 27001 says that you must document your information security risk assessment process. Key elements of the ISO 27001 risk assessment procedure. of the Standard states that organisations must “define and apply” a risk assessment process. Identify risks. Analyse risks.

Risk 52

Improving Vendor Risk Management

Data Breach Today

NYKA Advisory Services' Sunil Chandiramani Offers Insights for Financial Institutions Providing vendors with visibility to a company's systems makes the vendor management process far more complicated, says Sunil Chandiramani of NYKA Advisory Services

Risk 176

Managing IoT Risks: Reinventing Security

Data Breach Today

Security needs to be reinvented for the internet of things, and start-up companies can play a critical role, says Robin Saxby, the former CEO and founder of Arm Holdings, a U.K.-based based semiconductor company, who now invests in start-up firms

IoT 155

Report Highlights Risk of Medical Device 'Workarounds'

Data Breach Today

Experts: Problems at VA Medical Center Are Common at Many Healthcare Entities A watchdog agency review of a VA medical center in California spotlights security issues involving medical device "workarounds" that some experts say are common but often overlooked or underestimated risks

Risk 181

Browser Extensions: Are They Worth the Risk?

Krebs on Security

For its part, Google tries to communicate the potential risk of extensions using three “alert” levels: Low, medium and high, as detailed in the screenshot below. Doing otherwise is almost always a high-risk proposition. Popular file-sharing site Mega.nz

Risk 272

Analysis: The Cybersecurity Risks Major Corporations Face

Data Breach Today

The latest edition of the ISMG Security Report features a deep dive into an analysis of the cybersecurity risks that publicly traded companies face.

Risk 196

Patch Management as a Risk Management Strategy

Data Breach Today

Chris Hallenbeck of Tanium Discusses Good Security Hygiene Significant security events have many techniques in common, says Chris Hallenbeck of Tanium, who describes why security hygiene improvement, especially patch management, is so essential

Risk 211

Maximize Cybersecurity Risk Ratings in 2019

Data Breach Today

Insights from the Forrester New Wave: Cybersecurity Risk Rating Solutions, Q4 2018. If you are a security or risk leader, you know that even with a formal third-party risk program in place, you are not effectively keeping track of all of your third parties

Risk 194

Solving 3rd Party Cybersecurity Risk

Data Breach Today

Your organization's risk surface may be larger than you think. Your organization's risk surface is larger than you think. How can you get a handle on what risks exist, where they reside, and which ones are most important to resolve immediately

Risk 158

7 steps to a successful ISO 27001 risk assessment

IT Governance

Risk assessments are at the core of any organisation’s ISO 27001 compliance project. What is an information security risk assessment? An information security risk assessment is the process of identifying, resolving and preventing security problems. Qualify the extent of the risk.

Risk 77

Healthcare Security: Tactics for Reducing Risk

Data Breach Today

IBM's Christopher Bontempo on Where to Focus for Quick Results Reducing risk is a tall order, but IBM's Christopher Bontempo says healthcare security leaders can get immediate and measurable results by concentrating on two aspects: data security and incident response

Risk 172

HHS Updates Security Risk Assessment Tool

Data Breach Today

But Why Is Conducting a Risk Analysis So Challenging for So Many Organizations? But why is conducting a risk assessment so challenging for so many

Risk 198

Managing Third-Party Risks

Data Breach Today

Bitsight's Tom Turner on Security Ratings Managing third-party risks is more critical than ever, says Tom Turner of BitSight Technologies, who discusses the urgency of communicating that to the board

Risk 158

Travel Card Data Release Risked Australians' Privacy

Data Breach Today

But a recent incident in Australia put the privacy of millions of public transport travelers at risk after steps weren't taken to properly anonymize three years of travel records, Victoria's information commissioner has found

Risk 163

Using AI to Proactively Address Third-Party Risk

Data Breach Today

Microsoft's Abbas Kudrati Shares Recommendations Third-party risk assessments need to be ongoing, and artificial intelligence can play an important role, says Microsoft's Abbas Kudrati

Future-Proofing for IoT Risks

Data Breach Today

Check Point's Robert Falzon on Preparing for the Changes to Come The internet of things promises to change how enterprises operate - as well as the cybersecurity risks they will face. Robert Falzon of Check Point Software Technologies outlines IoT risks and how to prepare to mitigate them

IoT 169

Tackling the Prevalent Fraud Risks

Data Breach Today

Dora Gomez on the Highlights of ACFE Report to Nations What are the prevailing fraud trends, and how are they impacting consumers, clients and enterprises?

Risk 185

How to Manage Supply Chain Risks

Data Breach Today

Agile environments benefit from development platforms and open-source software, but that also raises the risks of attacks seeded in those supply chains, says Chet Wisniewski of Sophos, who describes steps that organizations can take to mitigate the risks

Risk 100

Vendor Security Risk Management: A Growing Concern

Data Breach Today

Eddie Chang, Travelers Insurance, cyber insurance, Quest Diagnostics, Optum360, breach, Labcorp, BioReference, AMCA, American Medical Collections Agency, vendor risk management, application security

Mitigating the Risks Posed by Malicious Insiders

Data Breach Today

Risk 180

Cybersecurity Incident Response and Managing Risk

Data Breach Today

IBM's Anup Kanti Deb Offers Insights Incident response is an ongoing process, a lifecycle that requires a risk mitigation strategy covering operational, legal and reputational risk

Risk 146

Election Security Program Aims to Mitigate Ransomware Risks

Data Breach Today

Department of Homeland Security to Help With Database Protections Within a month, the U.S. Department of Homeland Security hopes to launch a program to help states protect voter registration databases and systems in advance of the 2020 presidential election.