Risk Management

Risk Management news, analysis, research, how-to, opinion, and video.

1 threat intro
01 plan

pwnie express scorecard

Pwnie Express eases security remediation with a risk-assessment tool

Pwnie Express is adding a tool called Device Risk Scorecard to its Pulse Serivce that ranks the risks its security service finds on customer networks and makes it easier to remediate them.

target ciso primary

Target names new CISO to replace Brad Maiorino

Rich Agostino, who helped shore up the retail giant’s cybersecurity defense following a significant data breach, takes over chief information security officer duties as Brad Maiorino departs for Booz Allen.

risk

Want to improve risk management? Do the basics

Managing security takes time and focus, but “reasonable” efforts will yield significant results, a cybersecurity panel said Wednesday at Boston College.

hackers shadows group gang

Profiling 10 types of hackers

Understanding the different types of hackers that exist and what motivates them can help you to identify the attackers you are most susceptible to and properly defend yourself and your organization against cyberattacks.

01 light

7 tips to strengthen online security

If you are online today, checking email, buying someone a gift, posting to Facebook, paying bills, streaming Netflix, or monitoring your sleeping baby, you need to practice these seven tips for protecting your online presence.

chairs stage

Why more Chief Strategy and Risk Officers need a seat at the security table

For years the evolving role of chief information security officers has increasingly required them to think more like a chief risk or strategy officer and anticipate cyber threats before they happen. Now a perfect storm is brewing that...

fake email

A better security strategy than ‘know your enemy’: Know your co-workers

Something as simple as an uncharacteristic turn of phrase can clue people into an email’s illegitimacy.

1 threatening

7 universal rules of threat intelligence

Levi Gundert, vice president of intelligence and strategy at Recorded Future, will go over the seven universal rules of threat intelligence – what you should be doing no matter what, whether you use a platform or not.

eliminate insider threats 1

Who should be on an insider risk team?

Catching an insider taking confidential information doesn't happen by chance, and policies and procedures must be in place to know what to do when an insider is caught.

risk

Getting buy-in to combat risk

A risk council with stakeholders from across the company could be an effective way to get needed resources to mitigate the worst security risks.

risk

Getting buy-in to combat risk

A risk council with stakeholders from across the company could be an effective way to get needed resources to mitigate the worst security risks.

IBM Security to buy risk-visualization firm Agile 3 Solutions

IBM Security plans to buy San Francisco-based Agile 3 Solutions, which makes software for visualizing data risk for analysis by senior executives.

01 holes

Tips on where to start in managing risk

What is risk management? Anytime you have something of value (like a corporate network, a website, or a mobile application), there will be risk to manage in order to protect it. Traditional approaches and controls are no longer good...

boardroom presentation

Bringing boards up to cyber speed

The exponential growth of cyber risk has impacted roles for the CISO and the CEO, among others, but it has also left board members a little in the dark when it comes to understanding the risks associated with cybersecurity.

healthcare data breach ts

How a dose of AI could be the cure for hospital EHR cyberattacks in 2017

We are all sick (literally) and tired of the endless rounds of 'catch the data thief' playing at a hospital near you. Since these hospital attacks begin in 2014, they seem to get worse each year. Now industry pundits are indicating...

gas flame

Putting security risks on simmer with Chef

A bit of automation can ease the PCI compliance burden.

0 intro best practices

Best practices to fight corporate security risks

Ajit Sancheti, CEO and co-founder of Preempt, examines best practices each organization and their users must deploy, both in and out of corporate networks, to minimize malicious threats in inconspicuous (and conspicuous) places.

1 quicker

How automated investigation can accelerate threat detection

Cyber security analysts are overwhelmed with the pressure of keeping their companies safe. Here’s what you need to consider when adopting an automated investigation environment.

Load More