Risk Management

Risk Management | News, how-tos, features, reviews, and videos

3 sensitive data hacker phone

How can CSOs protect their CEO?

CEOs have a high level of visibility outside the organization and attackers can leverage the data they collect as a way to target them for cybersecurity attacks. Organizations can help protect your CEO from cybersecurity attacks by...

ransomware

Information governance for counties and municipalities

Most county and municipal governments don't have formal information governance programs, but adoption of IG would reduce risks, lower costs and vastly improve quality of services in these organizations.

7 challenge or conflict

Conflict-of-interest traps ensnare enterprise software implementations

Avoiding these two conflict-of-interest situations helps ensure the software you select meets your needs and the implementation is completed on time and on budget.

Yellow umbrella among many black umbrellas

HIPAA as an umbrella for county/municipal cybersecurity

Many county governments have departments or divisions that qualify as "covered entities" under HIPAA. For those organizations, it makes a great deal of sense to cover the entire enterprise under the umbrella of HIPAA rather than...

information security threat primary4

9 biggest information security threats through 2019

Each year, the Information Security Forum, a nonprofit association that researches and analyzes security and risk management issues, releases its 'Threat Horizon' report to provide a forward-looking view of the biggest security...

1 threat intro

These 10 people may be your greatest inside security risks

Last year was the worst on record for information security incidents, and the majority of those were due to inside sources, many studies agree. Prime suspects are employees and contractors with privileged user access.

01 plan

Do you have an incident response plan in place?

Details matter when developing an incident response (IR) plan. But, even the most successful IR plans can lack critical information, impeding how quickly normal business operations are restored.

pwnie express scorecard

Pwnie Express eases security remediation with a risk-assessment tool

Pwnie Express is adding a tool called Device Risk Scorecard to its Pulse Serivce that ranks the risks its security service finds on customer networks and makes it easier to remediate them.

target ciso primary

Target names new CISO to replace Brad Maiorino

Rich Agostino, who helped shore up the retail giant’s cybersecurity defense following a significant data breach, takes over chief information security officer duties as Brad Maiorino departs for Booz Allen.

risk game play boggle

Want to improve risk management? Do the basics

Managing security takes time and focus, but “reasonable” efforts will yield significant results, a cybersecurity panel said Wednesday at Boston College.

hackers shadows group gang

Profiling 10 types of hackers

Understanding the different types of hackers that exist and what motivates them can help you to identify the attackers you are most susceptible to and properly defend yourself and your organization against cyberattacks.

01 light

7 tips to strengthen online security

If you are online today, checking email, buying someone a gift, posting to Facebook, paying bills, streaming Netflix, or monitoring your sleeping baby, you need to practice these seven tips for protecting your online presence.

chairs stage

Why more Chief Strategy and Risk Officers need a seat at the security table

For years the evolving role of chief information security officers has increasingly required them to think more like a chief risk or strategy officer and anticipate cyber threats before they happen. Now a perfect storm is brewing that...

fake email

A better security strategy than ‘know your enemy’: Know your co-workers

Something as simple as an uncharacteristic turn of phrase can clue people into an email’s illegitimacy.

1 threatening

7 universal rules of threat intelligence

Levi Gundert, vice president of intelligence and strategy at Recorded Future, will go over the seven universal rules of threat intelligence – what you should be doing no matter what, whether you use a platform or not.

eliminate insider threats 1

Who should be on an insider risk team?

Catching an insider taking confidential information doesn't happen by chance, and policies and procedures must be in place to know what to do when an insider is caught.

risk game play boggle

Getting buy-in to combat risk

A risk council with stakeholders from across the company could be an effective way to get needed resources to mitigate the worst security risks.

risk game play boggle

Getting buy-in to combat risk

A risk council with stakeholders from across the company could be an effective way to get needed resources to mitigate the worst security risks.

IBM Security to buy risk-visualization firm Agile 3 Solutions

IBM Security plans to buy San Francisco-based Agile 3 Solutions, which makes software for visualizing data risk for analysis by senior executives.

dam burst water stream

Tips on where to start in managing risk

What is risk management? Anytime you have something of value (like a corporate network, a website, or a mobile application), there will be risk to manage in order to protect it. Traditional approaches and controls are no longer good...

Load More