Risk Management

What organizations need to know about the Digital Operational Resilience Act (DORA)

What organizations need to know about the Digital Operational Resilience Act (DORA) 2024-03-05 at 06:31 By Mirko Zorz In this Help Net Security interview, Kris Lovejoy, Global Security and Resilience Leader at Kyndryl, discusses the impact of the Digital Operational Resilience Act (DORA) on organizations across the EU, particularly in ICT risk management and cybersecurity. […]

React to this headline:

Loading spinner

What organizations need to know about the Digital Operational Resilience Act (DORA) Read More »

Industry Reactions to NIST Cybersecurity Framework 2.0: Feedback Friday

Industry Reactions to NIST Cybersecurity Framework 2.0: Feedback Friday 2024-03-01 at 14:16 By Eduard Kovacs Industry professionals comment on the official release of the NIST Cybersecurity Framework 2.0.  The post Industry Reactions to NIST Cybersecurity Framework 2.0: Feedback Friday appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source

React to this headline:

Loading spinner

Industry Reactions to NIST Cybersecurity Framework 2.0: Feedback Friday Read More »

Businesses foresee major impact from new SEC cybersecurity disclosure rules

Businesses foresee major impact from new SEC cybersecurity disclosure rules 2024-03-01 at 07:04 By Help Net Security While 98% of security professionals and executives have started working to comply with the new U.S. Securities and Exchange Commission (SEC) cybersecurity disclosure ruling, over one-third are still in the early phases of their efforts, according to AuditBoard.

React to this headline:

Loading spinner

Businesses foresee major impact from new SEC cybersecurity disclosure rules Read More »

98% of businesses linked to breached third parties

98% of businesses linked to breached third parties 2024-03-01 at 06:32 By Help Net Security According to the updated SEC regulations on cybersecurity incident disclosure, findings by SecurityScorecard reveal that 98% of companies are associated with a third party that has experienced a breach. It often takes months or longer for breaches to become public

React to this headline:

Loading spinner

98% of businesses linked to breached third parties Read More »

The Imperative for Modern Security: Risk-Based Vulnerability Management

The Imperative for Modern Security: Risk-Based Vulnerability Management 2024-02-29 at 15:01 By Torsten George By prioritizing vulnerabilities based on risk and aligning security efforts with business objectives, organizations can enhance their resilience to cyberattacks, optimize resource allocation, and maintain a proactive security posture. The post The Imperative for Modern Security: Risk-Based Vulnerability Management appeared first

React to this headline:

Loading spinner

The Imperative for Modern Security: Risk-Based Vulnerability Management Read More »

AI in cybersecurity presents a complex duality

AI in cybersecurity presents a complex duality 2024-02-28 at 06:03 By Help Net Security Companies more than ever view GRC (Governance, Risk, and Compliance) as a holistic process and are taking steps toward getting a complete view of their risk environment and compliance obligations, according to Hyperproof. Centralized GRC strategy gains momentum Centralizing strategy, unifying

React to this headline:

Loading spinner

AI in cybersecurity presents a complex duality Read More »

US Gov Says Software Measurability is ‘Hardest Problem to Solve’

US Gov Says Software Measurability is ‘Hardest Problem to Solve’ 2024-02-27 at 22:31 By Ryan Naraine White House calls for the “timely, complete, and consistent” publication of CVE and CWE data to help solve the security metrics problem. The post US Gov Says Software Measurability is ‘Hardest Problem to Solve’ appeared first on SecurityWeek. This

React to this headline:

Loading spinner

US Gov Says Software Measurability is ‘Hardest Problem to Solve’ Read More »

NIST CSF 2.0 released, to help all organizations, not just those in critical infrastructure

NIST CSF 2.0 released, to help all organizations, not just those in critical infrastructure 2024-02-27 at 08:20 By Help Net Security The National Institute of Standards and Technology (NIST) has updated its widely utilized Cybersecurity Framework (CSF), a key document for mitigating cybersecurity risks. The latest version, 2.0, is tailored to cater to a broad

React to this headline:

Loading spinner

NIST CSF 2.0 released, to help all organizations, not just those in critical infrastructure Read More »

How to make sense of the new SEC cyber risk disclosure rules

How to make sense of the new SEC cyber risk disclosure rules 2024-02-20 at 08:01 By Help Net Security SEC’s new cybersecurity risk management, strategy, governance, and incident disclosure rules, which require increased transparency around cybersecurity incidents, have been in effect since December 18, 2023. For businesses that already harbor concerns over their cybersecurity protections,

React to this headline:

Loading spinner

How to make sense of the new SEC cyber risk disclosure rules Read More »

Patch Tuesday: Adobe Warns of Critical Flaws in Widely Deployed Software

Patch Tuesday: Adobe Warns of Critical Flaws in Widely Deployed Software 2024-02-13 at 20:01 By Ryan Naraine Adobe ships patches for at least 30 documented security flaws, warning that users are exposed to code execution, security feature bypass and denial-of-service attacks. The post Patch Tuesday: Adobe Warns of Critical Flaws in Widely Deployed Software appeared

React to this headline:

Loading spinner

Patch Tuesday: Adobe Warns of Critical Flaws in Widely Deployed Software Read More »

NIS2 Directive raises stakes for security leaders

NIS2 Directive raises stakes for security leaders 2024-02-02 at 08:01 By Mirko Zorz In this Help Net Security interview, Roland Palmer, VP Global Operations Center at Sumo Logic, discusses key challenges and innovations of the NIS2 Directive, aiming to standardize cybersecurity practices across sectors. NIS2 mandates minimal cybersecurity requirements for member companies, encompassing policies on

React to this headline:

Loading spinner

NIS2 Directive raises stakes for security leaders Read More »

Third-party risk management best practices and why they matter

Third-party risk management best practices and why they matter 2024-01-29 at 08:01 By Helga Labus With organizations increasingly relying on third-party vendors, upping the third-party risk management (TPRM) game has become imperative to prevent the fallout of third-party compromises. Third-party risks SecurityScorecard recently found that 98% of organizations are connected with at least one third-party

React to this headline:

Loading spinner

Third-party risk management best practices and why they matter Read More »

Without clear guidance, SEC’s new rule on incident reporting may be detrimental

Without clear guidance, SEC’s new rule on incident reporting may be detrimental 2024-01-22 at 08:01 By Help Net Security The SEC has instituted a set of guidelines “requiring registrants to disclose material cybersecurity incidents they experience and to disclose on an annual basis material information regarding their cybersecurity risk management, strategy, and governance.” These new

React to this headline:

Loading spinner

Without clear guidance, SEC’s new rule on incident reporting may be detrimental Read More »

Global cyber inequity skyrockets

Global cyber inequity skyrockets 2024-01-22 at 06:31 By Help Net Security There has been a sharp increase in cyber inequity globally, with 90% of executives warning that urgent action is needed to address it, according to the World Economic Forum. While increased geopolitical tensions and economic instability continue to concern industry experts, the report spotlights

React to this headline:

Loading spinner

Global cyber inequity skyrockets Read More »

Key elements for a successful cyber risk management strategy

Key elements for a successful cyber risk management strategy 2024-01-15 at 06:32 By Mirko Zorz In this Help Net Security interview, Yoav Nathaniel, CEO at Silk Security, discusses the evolution of cyber risk management strategies and practices, uncovering common mistakes and highlighting key components for successful risk resolution. Nathaniel anticipates a growing pressure on organizations

React to this headline:

Loading spinner

Key elements for a successful cyber risk management strategy Read More »

Refocusing on Cybersecurity Essentials in 2024: A Critical Review

Refocusing on Cybersecurity Essentials in 2024: A Critical Review 2023-12-27 at 16:31 By Torsten George By supplementing traditional perimeter defense mechanisms with principles of data integrity, identity management, and risk-based prioritization, organizations can reduce their exposure to data breaches. The post Refocusing on Cybersecurity Essentials in 2024: A Critical Review appeared first on SecurityWeek. This

React to this headline:

Loading spinner

Refocusing on Cybersecurity Essentials in 2024: A Critical Review Read More »

How to incorporate human-centric security

How to incorporate human-centric security 2023-12-27 at 07:32 By Help Net Security Cybersecurity is awash in threat detection and mitigation solutions: SIEM, DLP, SOAR, MDR, EDR, XDR, and more. Threat detection is essential, as it serves to locate and minimize the threat as quickly and effectively as possible. However, some companies are starting to embrace

React to this headline:

Loading spinner

How to incorporate human-centric security Read More »

Data security and cost are key cloud adoption challenges for financial industry

Data security and cost are key cloud adoption challenges for financial industry 2023-12-27 at 06:05 By Help Net Security 91% of banks and insurance companies have now initiated their cloud journey, a significant increase from 2020, when only 37% of firms had embarked on their cloud transformations, according to Capgemini. However, this high rate and

React to this headline:

Loading spinner

Data security and cost are key cloud adoption challenges for financial industry Read More »

Zoom Unveils Open Source Vulnerability Impact Scoring System

Zoom Unveils Open Source Vulnerability Impact Scoring System 15/12/2023 at 16:33 By Eduard Kovacs Zoom launches an open source Vulnerability Impact Scoring System (VISS) tested within its bug bounty program. The post Zoom Unveils Open Source Vulnerability Impact Scoring System appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original

React to this headline:

Loading spinner

Zoom Unveils Open Source Vulnerability Impact Scoring System Read More »

Using AI and automation to manage human cyber risk

Using AI and automation to manage human cyber risk 07/12/2023 at 08:02 By Help Net Security Despite advanced security protocols, many cybersecurity incidents are still caused by employee actions. In this Help Net Security video, John Scott, Lead Cybersecurity Researcher at CultureAI, discusses how integrating AI and automation into your cybersecurity strategy can improve employee

React to this headline:

Loading spinner

Using AI and automation to manage human cyber risk Read More »

Optimized by Optimole
Scroll to Top