Security

Human Trafficking: How Businesses Can Combat the Modern Slavery Epidemic

Human Trafficking: How Businesses Can Combat the Modern Slavery Epidemic

Businesses must take steps to help identify and combat modern slavery on their premises and mitigate the risk of liability claims.

 
Seven Myths About Identity Governance

Seven Myths About Identity Governance

A comprehensive identity governance program can provide greater data security.

 
Notepad: Risk in Review – September 2019

Notepad: Risk in Review – September 2019

Tesla’s safety claims scrutinized, Capital One hacked, global food supply at risk, and more.

 
Going for the Gold: Cyberrisks at the Olympic Games

Going for the Gold: Cyberrisks at the Olympic Games

As the world’s highest-profile sporting event approaches, organizers must prepare for an evolving array of cyberthreats.

 
The Risks of Pregnancy-Tracking Apps

The Risks of Pregnancy-Tracking Apps

While pregnancy apps offer some useful benefits, they also raise serious privacy concerns and liability risks.

 
Simplifying Third-Party Risk Management

Simplifying Third-Party Risk Management

These five steps can help companies assess the data security risks of prospective partners.

 
Insurers Brace for Emerging 5G Risks

Insurers Brace for Emerging 5G Risks

New 5G technology promises many improvements, but may also introduce risks that could significantly impact the insurance industry.

 
Notepad: Risk in Review – July/August 2019

Notepad: Risk in Review – July/August 2019

Earthquakes rock California, insurers phase out coal, ransomware wave crashes cities, and more.

 
Incorporating Cloud Security Strategies into the AI and IoT Era

Incorporating Cloud Security Strategies into the AI and IoT Era

Security leaders can apply several lessons from the cloud era to address emerging AI and IoT risks.

 
Why Businesses Struggle with Email Security

Why Businesses Struggle with Email Security

Businesses and their employees are more susceptible than they realize to an array of phishing attacks and impersonations because of their blind trust in business communications—particularly email.

 
Sworn to Secrecy: Protecting Trade Secrets and Intellectual Property

Sworn to Secrecy: Protecting Trade Secrets and Intellectual Property

Given the key value of trade secrets, companies must evaluate their protection measures to mitigate theft and misappropriation risks.

 
UK Cybersecurity Office Warns Against Weak Passwords

UK Cybersecurity Office Warns Against Weak Passwords

The National Cyber Security Centre offered password security insights after interviews with more than 2,500 members of the public.

 
Economic Factors Drive Top Risks

Economic Factors Drive Top Risks

Economic and geopolitical uncertainty marked top risks facing businesses this year, while risk readiness hit a 12-year low.

 
The Reality of Trade Secret Protection

The Reality of Trade Secret Protection

A recent survey offers insight on trade secret theft protection, investigations and opportunities for improvement.

 
The Case for Uniform Data Breach Reporting

The Case for Uniform Data Breach Reporting

By creating clear terms, definitions and regulations on data breach reporting, the United States can gain greater insights on growing and changing cyber threats that companies face across industries.