Cyber-Risk

Incorporating Cloud Security Strategies into the AI and IoT Era

Incorporating Cloud Security Strategies into the AI and IoT Era

Security leaders can apply several lessons from the cloud era to address emerging AI and IoT risks.

 
Why Businesses Struggle with Email Security

Why Businesses Struggle with Email Security

Businesses and their employees are more susceptible than they realize to an array of phishing attacks and impersonations because of their blind trust in business communications—particularly email.

 
UK Cybersecurity Office Warns Against Weak Passwords

UK Cybersecurity Office Warns Against Weak Passwords

The National Cyber Security Centre offered password security insights after interviews with more than 2,500 members of the public.

 
Economic Factors Drive Top Risks

Economic Factors Drive Top Risks

Economic and geopolitical uncertainty marked top risks facing businesses this year, while risk readiness hit a 12-year low.

 
The Case for Uniform Data Breach Reporting

The Case for Uniform Data Breach Reporting

By creating clear terms, definitions and regulations on data breach reporting, the United States can gain greater insights on growing and changing cyber threats that companies face across industries.

 
Strengthening Third-Party Risk Management

Strengthening Third-Party Risk Management

Vendors are essential for doing business but may also introduce serious security risks.

 
Notepad: Risk in Review – May 2019

Notepad: Risk in Review – May 2019

Purdue settles opioid case, floods in the U.S. Midwest, Boeing planes grounded, and more.

 
Business Email Compromise on the Rise

Business Email Compromise on the Rise

Breach responders saw a 133% increase last year in business email compromise, driving a rise in cyber losses from hacking.

 
Why GDPR Should Not Stifle Information Sharing

Why GDPR Should Not Stifle Information Sharing

Does the processing and exchange of personal information embedded in some threat information violate GDPR and thus expose companies to severe fines?

 
Changing the Game: How Dynamic Risk Strategies Are Elevating Event Security

Changing the Game: How Dynamic Risk Strategies Are Elevating Event Security

With advanced technology and more mature risk management strategies, risk and event professionals are improving event security.

 
Data Privacy Governance in the Age of GDPR

Data Privacy Governance in the Age of GDPR

With new data protection regulations, Canadian and U.S. companies must reassess how they process and safeguard personal information.

 
The Dangers of Shadow Apps

The Dangers of Shadow Apps

The use of unsanctioned apps in the workplace introduces new risks for IT departments.

 
War Risk Exclusions Threaten Cyber Coverage

War Risk Exclusions Threaten Cyber Coverage

A recent dispute highlights how nation-state cyberattacks can complicate insurance coverage.

 
Facebook Plagued by Recent Security Problems

Facebook Plagued by Recent Security Problems

Cybercriminals are increasingly finding new ways to exploit security vulnerabilities at Facebook, putting the personal data of the social network’s users at risk.

 
Is GDPR Compliance Paying Off?

Is GDPR Compliance Paying Off?

In its 2019 Data Privacy Benchmark Study, Cisco found a correlation between GDPR preparedness and the frequency and severity of data breaches.