Insights on Mitigating Ransomware Risks

Data Breach Today

Janine Darling, the founder and CEO of STASH Global, discusses the pervasive and persistent problem of ransomware and how to mitigate the risks

Risk 151

RSA Spins Off Fraud and Risk Business

Data Breach Today

New Stand-Alone Firm Is Tasked With Combatting Digital Commerce Fraud RSA Security LLC has spun off its fraud and risk intelligence business into a stand-alone company named Outseer.

Risk 192
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

On Risk-Based Authentication

Schneier on Security

A Study on Usability and Security Perceptions of Risk-based Authentication “: Abstract : Risk-based Authentication (RBA) is an adaptive security measure to strengthen password-based authentication. I’ve blogged about risk-based authentication before.

Data Risk Governance: The BISO's Perspective

Data Breach Today

Patrick Benoit of CBRE on Necessary Ingredients for a Mature Program It's not just traditional data governance – it's about business risk. Patrick Benoit of CBRE gives the BISO's perspective on data risk governance

Risk 171

Testing at Every Stage of Development

Up to 80% of new products fail. The reality is harsh and the reasons why are endless. Perhaps the new product couldn’t oust a customer favorite. Maybe it looked great but was too hard to use. Or, despite being a superior product, the go-to-market strategy failed. There’s always a risk when building a new product, but you can hedge your bets by understanding exactly what your customers' expectations truly are at every step of the development process.

Quantum Computing: Assessing the Risks

Data Breach Today

William Dixon of World Economic Forum on Improving Infrastructure To unlock the value of quantum computing, two systemic risks - tech governance and cybersecurity - need to be overcome, says William Dixon of the World Economic Forum

Risk 133

COVID-19 Risks of Flying

Schneier on Security

This is all a prelude to saying that I have been paying a lot of attention to the COVID-related risks of flying. I think that most of the risk is pre-flight, in the airport: crowds at the security checkpoints, gates, and so on. airtravel covid19 riskassessment risksI fly a lot.

Risk 113

Top Risk Management Software Vendors

eSecurity Planet

Risk management software can provide risk monitoring, identification, analysis, assessment and mitigation, all in one solution. There are many factors that go into choosing the best risk management software for your specific organization’s business needs.

Risk 63

US Customs Apps Put Travelers' PII at Risk

Data Breach Today

OIG Audit Shows Consumer Applications Inadequately Protected U.S.

Risk 160

AI Security Risk Assessment Tool

Schneier on Security

Uncategorized artificial intelligence automation machine learning risk assessmentMicrosoft researchers just released an open-source automation tool for security testing AI systems: “ Counterfit.” ” Details on their blog.

Risk 76

Add User Tests to Your Agile Process: Reduce Risk in Shipping New Products

Agile has become the go-to methodology for companies that want to reduce the risk involved in shipping new products. But how do you prevent building items nobody wants? If you wait to get user feedback until after development, then you’ve waited too long.

Cybersecurity Leadership: Risk Exposure Awareness

Data Breach Today

CEOs and CISOs on Assessing and Mitigating the New Risk Landscape It might be new, but are we ready to call this "normal?"

Risk 151

Medical Devices: Mitigating Cyber Risks

Data Breach Today

As ransomware and other cyberattacks on healthcare organizations surge, the potential risks to medical devices are growing, says Kelly Rozumalski, director of secure connected health initiatives at the consulting firm Booz Allen Hamilton, who discusses risk mitigation efforts

Risk 144

The Legal Risks of Security Research

Schneier on Security

Sunoo Park and Kendra Albert have published “ A Researcher’s Guide to Some Legal Risks of Security Research.” Our Guide gives the most comprehensive presentation to date of this landscape of legal risks, with an eye to both legal and technical nuance.

Risk 96

Biometric Technology: Assessing the Risks

Data Breach Today

The growing use of biometric technology is raising concerns about privacy as well as identity theft and fraud, says attorney Paul Hales, who reviews recent legal and legislative developments

Risk 186

Are You Ready For Predictive Analytics?

Speaker: Anita Lauper Wood, Product Strategist

Successful implementation of predictive analytics can feel unpredictable. There are risks that need to be consciously addressed, and successful implementation requires the right strategy. Join Anita Lauper Wood, Product Strategist, for a valuable session for product and technology leaders.

ENISA Highlights AI Security Risks for Autonomous Cars

Data Breach Today

Automakers Should Employ Security-By-Design to Thwart Cyber Risks Autonomous vehicle manufacturers are advised to adopt security-by-design models to mitigate cybersecurity risks, as artificial intelligence is susceptible to evasion and poisoning attacks, says a new ENISA report

Third-Party Risk Management Essentials

Data Breach Today

Mark Sangster of eSentire Shares Lessons Learned Third-party vendor risk continues to pose a security challenge to organizations. Despite many having formal policies for managing third-party risk, almost half of organizations say they've suffered a data breach that traces to a third-party vendor, says Mark Sangster of eSentire

Risk 172

CISA Orders Agencies to Mitigate Pulse Secure VPN Risks

Data Breach Today

Agency Says Exploits Pose 'Unacceptable Risk' The U.S.

Risk 166

IoT Devices a Huge Risk to Enterprises

eSecurity Planet

“The security risk persists: plaintext communications are much easier for attackers to spy on or, worse, to intercept and modify, allowing them to exploit the IoT devices for malicious purposes,” researchers wrote in one of the reports.

IoT 83

Shift Left Security? Development Does Not Want to Own It.

Speaker: Shlomo Bielak, CTO, Benchmark Corp

Shifting security left to the earliest part of development is currently in the spotlight in the developer world. What teams are now discovering is, this approach results in misdirected ownership for developers and a frustrated security team. In the current climate, we cannot afford to let security implementations falter. It's time to manage your team's energies to maximize DevOps efficiency, all the while maintaining top security standards. Join Shlomo Bielak, and learn how to keep your DevSecOps team focused and connected without creating silos.

Mitigating Risks as Ransomware Tactics Change

Data Breach Today

Stuart McKenzie of FireEye on the Importance of Testing Defenses Ransomware attacks now routinely feature multifaceted extortion efforts, and defenses need to evolve, says Stuart McKenzie of FireEye, who offers an analysis of the findings of the FireEye M-Trends 2021 report

Risk 166

CISA: Defibrillator Dashboard Security Flaws Pose Risk

Data Breach Today

Risk 139

Synthetic ID Fraud: Risk Mitigation Strategies

Data Breach Today

Meridian Credit Union's Saif Nawaz on Using New Technologies As synthetic ID fraud in the financial services sector continues to rise next year, organizations must use new technologies to mitigate the risks, says Saif Nawaz of Meridian Credit Union in Canada

Risk 166

IoT Supply Chains: Where Risks Abound

Data Breach Today

ENISA Releases Guidance on Reducing IoT Supply Chain Risk IoT devices are like sausages: They're full of components of varying quality, and it's invariably disturbing to think about their origins.

IoT 151

How to Solve 4 Common Challenges of Legacy Information Management

Speaker: Chris McLaughlin, Chief Marketing Officer and Chief Product Officer, Nuxeo

After 20 years of Enterprise Content Management (ECM), businesses still face many of the same challenges with finding and managing information. Join Chris McLaughlin, CMO and CPO of Nuxeo, as he examines four common business challenges that these legacy ECM systems pose and how they can be addressed with a more modern approach.

Risks of Evidentiary Software

Schneier on Security

Over at Lawfare, Susan Landau has an excellent essay on the risks posed by software used to collect evidence (a Breathalyzer is probably the most obvious example).

Risk 63

Report Urges NASA to Improve Cybersecurity Risk Management

Data Breach Today

GAO Offers Recommendations to Improve Space Agency's Cyber Protections A government watchdog is urging NASA to make multiple improvements to its cybersecurity and risk management policies to counter threats to the space agency's network, infrastructure and data.

Risk 133

The Risks Posed by Mobile Health Apps

Data Breach Today

What privacy and security issues are raised by patients using smartphone apps to access health records? Attorney Helen Oscislawski and security expert Jarrett Kolthoff offer an analysis

Risk 215

The State of Integrated Risk Management

Data Breach Today

ServiceNow's Vasant Balasubramanian on Digital Transformation Integrated risk management and compliance offerings are moving to the cloud in a significant way to keep pace with digital transformation, says Vasant Balasubramanian of ServiceNow

The Unexpected Cost of Data Copies

This paper will discuss why organizations frequently end up with multiple data copies and how a secure "no-copy" data strategy enabled by the Dremio data lake service can help reduce complexity, boost efficiency, and dramatically reduce costs.

Security Risks of Chatbots

Schneier on Security

Good essay on the security risks -- to democratic discourse -- of chatbots. lies nationalsecuritypolicy propaganda risks

Risk 82

Mitigating the Risks Posed by Synthetic IDs

Data Breach Today

A Fraud Manager Describes the Roles of Artificial Intelligence, Machine Learning Artificial intelligence and machine learning offer the best hope for addressing the risks posed by synthetic identities, says Justin Davis, fraud manager at Digital Federal Credit Union

Risks of Password Managers

Schneier on Security

Stuart Schechter writes about the security risks of using a password manager. My particular choices about security and risk is to only store passwords on my computer -- not on my phone -- and not to put anything in the cloud. In my way of thinking, that reduces the risks of a password manager considerably. passwordsafe passwords riskassessment risks

Telehealth App Breach Spotlights Privacy, Security Risks

Data Breach Today

Risk 174

Minimizing File Transfer Risk

Data Breach Today

Jeffrey Edwards of Progress Software on Ensuring Privacy File transfers are a significant factor in accidental insider risk. Jeffrey Edwards of Progress Software explains how secure file transfers can help ensure privacy and play a role in regulatory compliance

Risk 118

Executive Order Focuses on Supply Chain Risk Management

Data Breach Today

Biden Administration Effort Comes During Shortage of Semiconductors In light of the global shortage of semiconductors, President Joe Biden signed an executive order Wednesday requiring a federal review of supply chain risks for these chips.

OnDemand Webinar | Benchmarking Digital Risk Factors

Data Breach Today

Findings For CISOs From Latest RIsk Surface Report. View this OnDemand webinar and learn about the key dimensions of internet risk surface

Risk 141

World Health Organization CISO on Supply Chain Risk

Data Breach Today

He understands supply chain risk, and he sees the SolarWinds hack as "resumption of a very old attack - in new packaging." He offers insights on mitigating this and other cybersecurity risks

Risk 160

Supply Chain Risk Management: Areas of Concern

Data Breach Today

Many healthcare organizations are failing to address shortcomings in security risk management for their supply chains, says former healthcare CIO David Finn, describing findings of a recent study assessing the state of cybersecurity in the sector

Risk 141