Insights on Mitigating Ransomware Risks

Data Breach Today

Janine Darling, the founder and CEO of STASH Global, discusses the pervasive and persistent problem of ransomware and how to mitigate the risks

Risk 205

Cybersecurity Leadership: Risk Exposure Awareness

Data Breach Today

CEOs and CISOs on Assessing and Mitigating the New Risk Landscape It might be new, but are we ready to call this "normal?"

Risk 236

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

RSA Spins Off Fraud and Risk Business

Data Breach Today

New Stand-Alone Firm Is Tasked With Combatting Digital Commerce Fraud RSA Security LLC has spun off its fraud and risk intelligence business into a stand-alone company named Outseer.

Risk 256

Quantum Computing: Assessing the Risks

Data Breach Today

William Dixon of World Economic Forum on Improving Infrastructure To unlock the value of quantum computing, two systemic risks - tech governance and cybersecurity - need to be overcome, says William Dixon of the World Economic Forum

Risk 188

Testing at Every Stage of Development

Up to 80% of new products fail. The reality is harsh and the reasons why are endless. Perhaps the new product couldn’t oust a customer favorite. Maybe it looked great but was too hard to use. Or, despite being a superior product, the go-to-market strategy failed. There’s always a risk when building a new product, but you can hedge your bets by understanding exactly what your customers' expectations truly are at every step of the development process.

Flaws in John Deere Systems Show Agriculture's Cyber Risk

Data Breach Today

John Deere, Researchers Spar Over Impact of Vulnerabilities Flaws uncovered in tractor manufacturer John Deere's systems underscore the cyber risks that come in tandem with the productivity gains from high-tech farming.

Does Abandoning Embassy in Kabul Pose Cybersecurity Risks?

Data Breach Today

abandoning its embassy and other facilities in Afghanistan poses cyber risks, thanks to the emergency planning that was already in place, some security experts say Security Experts Size Up Impact of US Rush to Leave Afghanistan It's unlikely that the U.S.

Risk 273

Alleged HVAC Hack Shines Spotlight on OT Risks to Healthcare

Data Breach Today

HVAC Vendor Incident Said to Affect Its Boston Hospital Clients A hacking incident reportedly involving a Massachusetts-based vendor that provides HVAC systems to customers including several high profile Boston-area hospitals shines another spotlight on the growing cybersecurity risks involving IoT devices and OT equipment.

Risk 244

ENISA Highlights AI Security Risks for Autonomous Cars

Data Breach Today

Automakers Should Employ Security-By-Design to Thwart Cyber Risks Autonomous vehicle manufacturers are advised to adopt security-by-design models to mitigate cybersecurity risks, as artificial intelligence is susceptible to evasion and poisoning attacks, says a new ENISA report

Risk 250

Flashpoint Acquires Risk Based Security

Dark Reading

Flashpoint plans to integrate Risk Based Security data and technology into its platform to boost threat intelligence and vulnerability management

Risk 64

Add User Tests to Your Agile Process: Reduce Risk in Shipping New Products

Agile has become the go-to methodology for companies that want to reduce the risk involved in shipping new products. But how do you prevent building items nobody wants? If you wait to get user feedback until after development, then you’ve waited too long.

Why Healthcare Entities Fall Short Managing Security Risk

Data Breach Today

Why do so many HIPAA -covered entities and their vendors do such a poor job managing security risk and safeguarding patient's protected health information?

Risk 207

Best Risk Management Software for 2021

eSecurity Planet

Enterprise risk management software can provide risk monitoring, identification, analysis, assessment, and mitigation, all in one solution. . Jump to: Top Risk Management Software Vendors What is Risk Management? Top Risk Management Software Vendors.

Risk 60

CISA: Defibrillator Dashboard Security Flaws Pose Risk

Data Breach Today

Risk 233

COVID-19 Risks of Flying

Schneier on Security

This is all a prelude to saying that I have been paying a lot of attention to the COVID-related risks of flying. I think that most of the risk is pre-flight, in the airport: crowds at the security checkpoints, gates, and so on. airtravel covid19 riskassessment risksI fly a lot.

Risk 111

Are You Ready For Predictive Analytics?

Speaker: Anita Lauper Wood, Product Strategist

Successful implementation of predictive analytics can feel unpredictable. There are risks that need to be consciously addressed, and successful implementation requires the right strategy. Join Anita Lauper Wood, Product Strategist, for a valuable session for product and technology leaders.

NIST Works to Create AI Risk Management Framework

Data Breach Today

Agency Now Seeks Feedback to Help Address Governance Challenges Citing a need to secure artificial intelligence technologies, NIST is working to create risk management guidance around the usage of AI and machine learning, the agency announced this week.

Risk 236

ISMG Editors’ Panel: Cyberattacks Now Risk Kinetic Response

Data Breach Today

Join four Information Security Media Group editors as they describe the top issues of the week, including the risk of cyberattacks provoking a kinetic response, as well as top healthcare CISOs' tips for handling supply chain security, resiliency and ransomware

Risk 225

Data Risk Governance: The BISO's Perspective

Data Breach Today

Patrick Benoit of CBRE on Necessary Ingredients for a Mature Program It's not just traditional data governance – it's about business risk. Patrick Benoit of CBRE gives the BISO's perspective on data risk governance

Risk 167

Thingiverse Breach: 50,000 3D Printers Faced Hijacking Risk

Data Breach Today

Upwards of 2 million users may have been affected by the breach, which left their 3D printers at risk of being hijacked

Risk 196

Shift Left Security? Development Does Not Want to Own It.

Speaker: Shlomo Bielak, CTO, Benchmark Corp

Shifting security left to the earliest part of development is currently in the spotlight in the developer world. What teams are now discovering is, this approach results in misdirected ownership for developers and a frustrated security team. In the current climate, we cannot afford to let security implementations falter. It's time to manage your team's energies to maximize DevOps efficiency, all the while maintaining top security standards. Join Shlomo Bielak, and learn how to keep your DevSecOps team focused and connected without creating silos.

Securing Remote Access With Risk-Based Authentication

Data Breach Today

Implementing an adaptive, risk-based authentication process for remote system access is proving effective as more staff members work from home during the COVID-19 pandemic, says Ant Allan, a vice president and analyst at Gartner

Biometric Technology: Assessing the Risks

Data Breach Today

The growing use of biometric technology is raising concerns about privacy as well as identity theft and fraud, says attorney Paul Hales, who reviews recent legal and legislative developments

Risk 212

AI Security Risk Assessment Tool

Schneier on Security

Uncategorized artificial intelligence automation machine learning risk assessmentMicrosoft researchers just released an open-source automation tool for security testing AI systems: “ Counterfit.” ” Details on their blog.

Risk 87

IoT Supply Chains: Where Risks Abound

Data Breach Today

ENISA Releases Guidance on Reducing IoT Supply Chain Risk IoT devices are like sausages: They're full of components of varying quality, and it's invariably disturbing to think about their origins.

IoT 192

How to Solve 4 Common Challenges of Legacy Information Management

Speaker: Chris McLaughlin, Chief Marketing Officer and Chief Product Officer, Nuxeo

After 20 years of Enterprise Content Management (ECM), businesses still face many of the same challenges with finding and managing information. Join Chris McLaughlin, CMO and CPO of Nuxeo, as he examines four common business challenges that these legacy ECM systems pose and how they can be addressed with a more modern approach.

Data as Value or Risk. Your Choice.

IG Guru

The post Data as Value or Risk. Business Compliance IG News Information Governance Record Retention Records Management Risk News Sponsored Storage Andrew Spett Data Risk Data Value Retention RICOHBy Andrew Spett, Esq., IGP, CIGO “I hate retention policy!

Risk 83

Medtronic Insulin Pump Devices Recalled Due to Serious Risks

Data Breach Today

FDA Warns Exploitation of Security Flaw Could Cause Death The Food and Drug Administration on Tuesday issued a warning notifying patients that medical device maker Medtronic has expanded a recall of remote controllers for certain wireless insulin pumps that were part of an earlier recall.

Risk 244

Best Third-Party Risk Management (TPRM) Tools of 2021

eSecurity Planet

In a developing market, third-party risk management (TPRM) software and tools could be the answer to helping organizations fill the gap. Best Third-Party Risk Management (TPRM) Tools. BitSight is a Leader in the Forrester Wave report for Cybersecurity Risk Rating Platforms in 2021.

Risk 82

Reduce Security Risk of Healthcare Legacy Systems, Devices

Data Breach Today

HHS OCR: If Old Gear Cannot Be Replaced, Take Other Steps to Protect PHI Federal regulators are reminding healthcare organizations about the critical importance of addressing security risks involving legacy systems and devices - including specialty software and gear - that are often difficult for entities to replace. What steps should entities tak

Risk 174

The Unexpected Cost of Data Copies

This paper will discuss why organizations frequently end up with multiple data copies and how a secure "no-copy" data strategy enabled by the Dremio data lake service can help reduce complexity, boost efficiency, and dramatically reduce costs.

Mitigating the Risks Posed by Synthetic IDs

Data Breach Today

A Fraud Manager Describes the Roles of Artificial Intelligence, Machine Learning Artificial intelligence and machine learning offer the best hope for addressing the risks posed by synthetic identities, says Justin Davis, fraud manager at Digital Federal Credit Union

Medical Devices: Mitigating Cyber Risks

Data Breach Today

As ransomware and other cyberattacks on healthcare organizations surge, the potential risks to medical devices are growing, says Kelly Rozumalski, director of secure connected health initiatives at the consulting firm Booz Allen Hamilton, who discusses risk mitigation efforts

Risk 142

Report Urges NASA to Improve Cybersecurity Risk Management

Data Breach Today

GAO Offers Recommendations to Improve Space Agency's Cyber Protections A government watchdog is urging NASA to make multiple improvements to its cybersecurity and risk management policies to counter threats to the space agency's network, infrastructure and data.

Risk 216

CISA Orders Agencies to Mitigate Pulse Secure VPN Risks

Data Breach Today

Agency Says Exploits Pose 'Unacceptable Risk' The U.S.

Risk 206

Mitigating the Risks of Malicious OAuth Apps

Data Breach Today

applications to siphon data and access sensitive information from cloud platforms, and mitigating the risks is proving challenging, according to the security firm Proofpoint Proofpoint Sizes Up the Cloud Security Battle Attackers are increasingly using malicious OAuth 2.0

Risk 154

US Customs Apps Put Travelers' PII at Risk

Data Breach Today

OIG Audit Shows Consumer Applications Inadequately Protected U.S.

Risk 264

The Risks Posed by Mobile Health Apps

Data Breach Today

What privacy and security issues are raised by patients using smartphone apps to access health records? Attorney Helen Oscislawski and security expert Jarrett Kolthoff offer an analysis

Risk 249

Cybersecurity Leadership: Risk in OT and IIoT

Data Breach Today

In a panel discussion, cybersecurity leaders discuss what it takes to get the C-suite's attention to prioritize this new generation of risk

Risk 141

Mozilla addresses High-Risk Firefox, Thunderbird vulnerabilities

Security Affairs

Other high-risk flaws fixed with the latest Firefox release include two use-after-free flaws, tracked as CVE-2022-22740 and CVE-2022-22737 respectively, and an iframe sandbox bypass using XSLT tracked as CVE-2021-4140.

Risk 82