Security

Incorporating Cloud Security Strategies into the AI and IoT Era

Incorporating Cloud Security Strategies into the AI and IoT Era

Security leaders can apply several lessons from the cloud era to address emerging AI and IoT risks.

 
Why Businesses Struggle with Email Security

Why Businesses Struggle with Email Security

Businesses and their employees are more susceptible than they realize to an array of phishing attacks and impersonations because of their blind trust in business communications—particularly email.

 
Sworn to Secrecy: Protecting Trade Secrets and Intellectual Property

Sworn to Secrecy: Protecting Trade Secrets and Intellectual Property

Given the key value of trade secrets, companies must evaluate their protection measures to mitigate theft and misappropriation risks.

 
UK Cybersecurity Office Warns Against Weak Passwords

UK Cybersecurity Office Warns Against Weak Passwords

The National Cyber Security Centre offered password security insights after interviews with more than 2,500 members of the public.

 
Economic Factors Drive Top Risks

Economic Factors Drive Top Risks

Economic and geopolitical uncertainty marked top risks facing businesses this year, while risk readiness hit a 12-year low.

 
The Reality of Trade Secret Protection

The Reality of Trade Secret Protection

A recent survey offers insight on trade secret theft protection, investigations and opportunities for improvement.

 
The Case for Uniform Data Breach Reporting

The Case for Uniform Data Breach Reporting

By creating clear terms, definitions and regulations on data breach reporting, the United States can gain greater insights on growing and changing cyber threats that companies face across industries.

 
Strengthening Third-Party Risk Management

Strengthening Third-Party Risk Management

Vendors are essential for doing business but may also introduce serious security risks.

 
Protecting Against Employee Theft

Protecting Against Employee Theft

To prevent or uncover embezzlement schemes, companies must first dispel common myths.

 
Notepad: Risk in Review – May 2019

Notepad: Risk in Review – May 2019

Purdue settles opioid case, floods in the U.S. Midwest, Boeing planes grounded, and more.

 
Business Email Compromise on the Rise

Business Email Compromise on the Rise

Breach responders saw a 133% increase last year in business email compromise, driving a rise in cyber losses from hacking.

 
Changing the Game: How Dynamic Risk Strategies Are Elevating Event Security

Changing the Game: How Dynamic Risk Strategies Are Elevating Event Security

With advanced technology and more mature risk management strategies, risk and event professionals are improving event security.

 
The Evolution of Parametric Insurance

The Evolution of Parametric Insurance

The insurance industry is creating new applications for index-based coverage.

 
Data Privacy Governance in the Age of GDPR

Data Privacy Governance in the Age of GDPR

With new data protection regulations, Canadian and U.S. companies must reassess how they process and safeguard personal information.

 
The Dangers of Shadow Apps

The Dangers of Shadow Apps

The use of unsanctioned apps in the workplace introduces new risks for IT departments.