Risk Management

Compyl Raises $12 Million for GRC Platform

Compyl Raises $12 Million for GRC Platform 2025-06-04 at 14:43 By Eduard Kovacs Compyl has raised $12 million in a Series A funding round that will be invested in go-to-market initiatives, hirings, and GRC platform expansion. The post Compyl Raises $12 Million for GRC Platform appeared first on SecurityWeek. This article is an excerpt from […]

React to this headline:

Loading spinner

Compyl Raises $12 Million for GRC Platform Read More »

Webinar Today: Redefining Vulnerability Management With Exposure Validation

Webinar Today: Redefining Vulnerability Management With Exposure Validation 2025-06-04 at 14:01 By SecurityWeek News Learn why your security controls matter more than theoretical risk scores and how exposure validation helps slash massive patch lists down to the few vulnerabilities that truly demand action. The post Webinar Today: Redefining Vulnerability Management With Exposure Validation appeared first

React to this headline:

Loading spinner

Webinar Today: Redefining Vulnerability Management With Exposure Validation Read More »

How to manage your cyber risk in a modern attack surface

How to manage your cyber risk in a modern attack surface 2025-06-04 at 09:01 By Help Net Security According to research, 62% of organizations said their attack surface grew over the past year. It’s no coincidence that 76% of organizations also reported a cyberattack due to an exposed asset in 2024, as expanding digital footprints

React to this headline:

Loading spinner

How to manage your cyber risk in a modern attack surface Read More »

CISOs need better tools to turn risk into action

CISOs need better tools to turn risk into action 2025-06-04 at 07:01 By Help Net Security Many organizations are overwhelmed by the complexity of their IT systems, making it difficult to manage cybersecurity risks, according to a new Ivanti report. The “Exposure Management: From Subjective to Objective Cybersecurity” report points out that as companies keep

React to this headline:

Loading spinner

CISOs need better tools to turn risk into action Read More »

CISO 3.0: Leading AI governance and security in the boardroom

CISO 3.0: Leading AI governance and security in the boardroom 2025-06-02 at 08:50 By Mirko Zorz In this Help Net Security interview, Aaron McCray, Field CISO at CDW, discusses how AI is transforming the CISO role from a tactical cybersecurity guardian into a strategic enterprise risk advisor. With AI now embedded across business functions, CISOs

React to this headline:

Loading spinner

CISO 3.0: Leading AI governance and security in the boardroom Read More »

CISOs prioritize AI-driven automation to optimize cybersecurity spending

CISOs prioritize AI-driven automation to optimize cybersecurity spending 2025-05-29 at 08:04 By Help Net Security Cybersecurity leaders and consultants identified AI-driven automation and cost optimization as top organizational priorities, according to Wipro. 30% of respondents are investing in AI automation to enhance their cybersecurity operations. AI-driven automation can help in detecting and responding to threats

React to this headline:

Loading spinner

CISOs prioritize AI-driven automation to optimize cybersecurity spending Read More »

Taming the Hacker Storm: Why Millions in Cybersecurity Spending Isn’t Enough

Taming the Hacker Storm: Why Millions in Cybersecurity Spending Isn’t Enough 2025-05-22 at 13:06 By Stu Sjouwerman Despite massive investment, the explosion of sophisticated malware and deepfake attacks persists because organizations struggle to verify digital identities and establish fundamental trust. The post Taming the Hacker Storm: Why Millions in Cybersecurity Spending Isn’t Enough appeared first

React to this headline:

Loading spinner

Taming the Hacker Storm: Why Millions in Cybersecurity Spending Isn’t Enough Read More »

Insider risk management needs a human strategy

Insider risk management needs a human strategy 2025-05-14 at 08:01 By Mirko Zorz Insider risk is not just about bad actors. Most of the time, it’s about mistakes. Someone sends a sensitive file to the wrong address, or uploads a document to their personal cloud to work from home. In many cases, there is no

React to this headline:

Loading spinner

Insider risk management needs a human strategy Read More »

Breaking down silos in cybersecurity

Breaking down silos in cybersecurity 2025-05-13 at 08:34 By Help Net Security All organizations erect silos – silos between groups and departments, across functions and among technologies. Silos represent differences in practices, culture and operations. Their presence inhibits communication and collaboration. As companies scale from startup to mid-sized and beyond, silos multiply and ossify. As

React to this headline:

Loading spinner

Breaking down silos in cybersecurity Read More »

Half of red flags in third-party deals never reach compliance teams

Half of red flags in third-party deals never reach compliance teams 2025-05-02 at 07:32 By Help Net Security Third-party risk management (TPRM) is compromised in many organizations because those holding the relationship with the third-party (relationship owners) don’t escalate red flags to compliance teams reliably, according to Gartner. The post Half of red flags in

React to this headline:

Loading spinner

Half of red flags in third-party deals never reach compliance teams Read More »

Tech Giants Propose Standard For End-of-Life Security Disclosures

Tech Giants Propose Standard For End-of-Life Security Disclosures 2025-04-30 at 18:50 By Ryan Naraine The OpenEoX model proposes a shared data format that can be integrated into SBOMs, security advisories, and other ecosystem tools.  The post Tech Giants Propose Standard For End-of-Life Security Disclosures appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Tech Giants Propose Standard For End-of-Life Security Disclosures Read More »

How do You Know if You’re Ready for a Red Team Partnership?

How do You Know if You’re Ready for a Red Team Partnership? 2025-04-29 at 19:23 By Trevin Edgeworth Before engaging in a full-scope exercise, it’s important to assess whether your program, people and processes are truly ready.  The post How do You Know if You’re Ready for a Red Team Partnership? appeared first on SecurityWeek.

React to this headline:

Loading spinner

How do You Know if You’re Ready for a Red Team Partnership? Read More »

Inside the Verizon 2025 DBIR: Five Trends That Signal a Shift in the Cyber Threat Economy

Inside the Verizon 2025 DBIR: Five Trends That Signal a Shift in the Cyber Threat Economy 2025-04-25 at 15:53 By Danelle Au With over 12,000 breaches analyzed, this year’s DBIR reveals a landscape shaped by not just individual threats, but by entire economies of compromise. The post Inside the Verizon 2025 DBIR: Five Trends That

React to this headline:

Loading spinner

Inside the Verizon 2025 DBIR: Five Trends That Signal a Shift in the Cyber Threat Economy Read More »

Transforming cybersecurity into a strategic business enabler

Transforming cybersecurity into a strategic business enabler 2025-04-09 at 08:20 By Mirko Zorz In this Help Net Security interview, Kevin Serafin, CISO at Ecolab, discusses aligning security strategy with long-term business goals, building strong partnerships across the organization, and approaching third-party risk with agility. How do you define cyber risk within your organization’s overall enterprise

React to this headline:

Loading spinner

Transforming cybersecurity into a strategic business enabler Read More »

Anecdotes Raises $30 Million for Enterprise GRC Platform

Anecdotes Raises $30 Million for Enterprise GRC Platform 2025-04-08 at 18:04 By Eduard Kovacs Anecdotes has raised $55 million in an extended Series B funding round that brings the total raised by the company to $85 million.  The post Anecdotes Raises $30 Million for Enterprise GRC Platform appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Anecdotes Raises $30 Million for Enterprise GRC Platform Read More »

Building a cybersecurity strategy that survives disruption

Building a cybersecurity strategy that survives disruption 2025-04-03 at 08:14 By Mirko Zorz Cybersecurity isn’t what it used to be. Attackers are moving quicker, disruptions happen all the time, and many security plans built for more predictable times just can’t keep up. With everything from ransomware to geopolitical threats to cloud slip-ups hitting companies, there’s

React to this headline:

Loading spinner

Building a cybersecurity strategy that survives disruption Read More »

Critical Condition: Legacy Medical Devices Remain Easy Targets for Ransomware

Critical Condition: Legacy Medical Devices Remain Easy Targets for Ransomware 2025-03-28 at 14:50 By Kevin Townsend Analysis found that 99% of healthcare organizations are vulnerable to publicly available exploits. The post Critical Condition: Legacy Medical Devices Remain Easy Targets for Ransomware appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source

React to this headline:

Loading spinner

Critical Condition: Legacy Medical Devices Remain Easy Targets for Ransomware Read More »

How healthcare CISOs can balance security and accessibility without compromising care

How healthcare CISOs can balance security and accessibility without compromising care 2025-03-20 at 08:35 By Mirko Zorz In this Help Net Security interview, Sunil Seshadri, EVP and CSO at HealthEquity, talks about the growing risks to healthcare data and what organizations can do to stay ahead. He shares insights on vendor management, zero trust, and

React to this headline:

Loading spinner

How healthcare CISOs can balance security and accessibility without compromising care Read More »

How financial institutions can minimize their attack surface

How financial institutions can minimize their attack surface 2025-03-18 at 08:01 By Mirko Zorz In this Help Net Security interview, Sunil Mallik, CISO of Discover Financial Services, discusses cybersecurity threats for financial institutions. He also shares insights on balancing compliance with agility, lessons from regulatory audits, and Discover’s approach to risk management and workforce development.

React to this headline:

Loading spinner

How financial institutions can minimize their attack surface Read More »

CISOs, are your medical devices secure? Attackers are watching closely

CISOs, are your medical devices secure? Attackers are watching closely 2025-03-13 at 08:02 By Mirko Zorz The adoption of connected medical devices, collectively called the Internet of Medical Things (IoMT), has transformed patient care. However, this technological advancement has also introduced cybersecurity challenges to safeguard patient safety and uphold organizational security. Securing IoMT: Prioritizing risks

React to this headline:

Loading spinner

CISOs, are your medical devices secure? Attackers are watching closely Read More »

Scroll to Top