Safe Security purchased the creators of the industry's only open standard for cyber risk quantification to improve the visibility, management and communication of risk. Buying RiskLens will help CISOs answer questions about risk from board members or regulators without talking about products.
Attackers are targeting the weakest link in the supply chain. Because every vendor poses a risk, you need to classify them by risk and track all the data they manage, said Matan Or-El, co-founder and CEO of Panorays, who advised taking a holistic view of your third-party risk program.
Operationalizing security comes down to making it part of the business process, and everyone in the organization must be responsible. Goals and the objectives must be clearly spelled out, including lines of accountability and ownership, said Jason Hart, chief technology officer for EMEA at Rapid7.
Information security is no longer confined to the tech domain, and instead must align with business outcomes, adapted to suit an organizations' risk appetite, said Matt Gordon-Smith, former CISO at Gatwick Airport. Security teams often must balance competing needs and risks.
ThreatLocker will debut a security reporting tool for small businesses that not only details what's running in their environment but also where it was developed, CEO Danny Jenkins said. The company can break down where any dark mode extension in a client's environment came from and who's funding it.
Organizations need to adopt a creative approach when building policies around the legal, commercial and reputational risks raised by generative AI tools - such as with privacy, consumer protection and contractual obligations, said legal expert Anna King of Markel.
Experts believe China's revised Counter-Espionage Law gives the Chinese Communist Party the power to retaliate against Western financial and technological sanctions and also control rising discontent among Chinese citizens. The law went into effect on Saturday.
80% of breaches originate outside of the organization, while only about 20% begin with trusted insiders, according to the Verizon 2022 Data Breach Investigations Report. It’s possible that because many organizations haven’t yet experienced a breach from an insider threat, they perceive external threats as the...
According to the 2022 Verizon Data Breach Investigations Report, insider threats and credential-based attacks comprise the majority of security breaches (over 90%) impacting organizations. Insider attacks involve malicious and negligent activity against an organization that originate from people who have been granted...
Insider risk can come from malicious, negligent, or compromised insiders - those with trusted credentials within your organization. Insiders are authorized to use IT resources, so conventional security tools offer little detection power to distinguish whether authorized actions have malicious intent. If an insider...
Cyber insurance companies gather a lot of information on the cost of breaches, but security organizations need to know the bigger picture. Jack Jones, chairman of the FAIR Institute, discussed identifying risk and evaluating overall costs with the FAIR model.
Cybersecurity organizations are constantly monitoring systems for signs of a breach and patching vulnerabilities, but the real focus should be on enterprise risk. Nick Sanna, president of FAIR Institute, makes the case for implementing a risk-based approach to cybersecurity.
With the growth of generative AI services, organizations want better control of the data going in and coming out of AI. Talon CEO Ofer Ben-Noon discussed how his firm has built a DLP compliance model around generative AI services that blocks healthcare information or SWIFT data shared with ChatGPT.
This week, the U.S. sanctioned Russians running influence campaigns, the owner of the Monopoly darknet drug market was charged, CISA ordered federal agencies to patch flaws before July 13, Suncor Energy suffered a cyberattack and Petro-Canada gas stations were affected.
Venn Software landed Series A funding to help businesses ensure the security and compliance of data on laptops they don't necessarily manage or own. The $29 million will enable firms to control and govern corporate data on worker-owned devices without forcing users to launch remote virtual desktops.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.