Risk Management

Risk Management news, analysis, research, how-to, opinion, and video.

dentist
img 20170512 095943

internet security risk public domain web

8 ways to manage an internet or security crisis

IT, communications and security experts share tips on what to do when your business is hit with an IT-related disaster, such as a cyberattack, an ecommerce site crash or a software failure.

artificial intelligence AI machine learning brain circuit

5 machine learning trends that will define 2017

Machine learning is at the core of many innovations that are set to improve our daily lives this year.

dollar

With security awareness, money talks

One problem with what we tell employees about taking security precautions is that the precautions interfere with their jobs.

Threat detection automation won’t solve all your problems

To close the cybersecurity gap, look to incident response automation

3 sensitive data hacker phone

How can CSOs protect their CEO?

CEOs have a high level of visibility outside the organization and attackers can leverage the data they collect as a way to target them for cybersecurity attacks. Organizations can help protect your CEO from cybersecurity attacks by...

ransomware

Information governance for counties and municipalities

Most county and municipal governments don't have formal information governance programs, but adoption of IG would reduce risks, lower costs and vastly improve quality of services in these organizations.

7 challenge or conflict

Conflict-of-interest traps ensnare enterprise software implementations

Avoiding these two conflict-of-interest situations helps ensure the software you select meets your needs and the implementation is completed on time and on budget.

Yellow umbrella among many black umbrellas

HIPAA as an umbrella for county/municipal cybersecurity

Many county governments have departments or divisions that qualify as "covered entities" under HIPAA. For those organizations, it makes a great deal of sense to cover the entire enterprise under the umbrella of HIPAA rather than...

information security threat primary4

9 biggest information security threats through 2019

Each year, the Information Security Forum, a nonprofit association that researches and analyzes security and risk management issues, releases its 'Threat Horizon' report to provide a forward-looking view of the biggest security...

1 threat intro

These 10 people may be your greatest inside security risks

Last year was the worst on record for information security incidents, and the majority of those were due to inside sources, many studies agree. Prime suspects are employees and contractors with privileged user access.

01 plan

Do you have an incident response plan in place?

Details matter when developing an incident response (IR) plan. But, even the most successful IR plans can lack critical information, impeding how quickly normal business operations are restored.

pwnie express scorecard

Pwnie Express eases security remediation with a risk-assessment tool

Pwnie Express is adding a tool called Device Risk Scorecard to its Pulse Serivce that ranks the risks its security service finds on customer networks and makes it easier to remediate them.

target ciso primary

Target names new CISO to replace Brad Maiorino

Rich Agostino, who helped shore up the retail giant’s cybersecurity defense following a significant data breach, takes over chief information security officer duties as Brad Maiorino departs for Booz Allen.

risk game play boggle

Want to improve risk management? Do the basics

Managing security takes time and focus, but “reasonable” efforts will yield significant results, a cybersecurity panel said Wednesday at Boston College.

hackers shadows group gang

Profiling 10 types of hackers

Understanding the different types of hackers that exist and what motivates them can help you to identify the attackers you are most susceptible to and properly defend yourself and your organization against cyberattacks.

01 light

7 tips to strengthen online security

If you are online today, checking email, buying someone a gift, posting to Facebook, paying bills, streaming Netflix, or monitoring your sleeping baby, you need to practice these seven tips for protecting your online presence.

chairs stage

Why more Chief Strategy and Risk Officers need a seat at the security table

For years the evolving role of chief information security officers has increasingly required them to think more like a chief risk or strategy officer and anticipate cyber threats before they happen. Now a perfect storm is brewing that...

fake email

A better security strategy than ‘know your enemy’: Know your co-workers

Something as simple as an uncharacteristic turn of phrase can clue people into an email’s illegitimacy.

Load More