Security News

Data management initiatives in the finance sector, such as data collection, integration, and automation, are being constrained by a severe lack of digital skills and maturity. 64% of technical decision makers feel their organizations lack the skilled technical resources to integrate external data into core platforms, and, 57% believe they are only at a foundational level of digital maturity.

Cloud security is the umbrella that holds within it: IaaS, PaaS and SaaS. Gartner created the SaaS Security Posture Management category for solutions that continuously assess security risk and manage the SaaS applications' security posture. While the native security controls of SaaS apps are often robust, it falls on the responsibility of the organization to ensure that all configurations are properly set - from global settings, to every user role and privilege.

CIOs have had their hands full since the start of the pandemic with three risk management and governance priorities weighing heavily on their minds. CIOs are becoming more sharply focused on information security and risk management since the pandemic.

The maturity model looks at the state of remote and hybrid work and provides a path for organizations to reach higher levels of maturity for increased employee retention and satisfaction, as well as improved productivity. With estimates stating that one in five workers will be remote and a majority working in a hybrid environment, and 40% of organizations embracing a hybrid work strategy over the next two years, the digital employee experience is more important than ever before.

57% of respondents stated that remote work has increased the complexity and scale of patch management. A patch for the vulnerability exploited by the ransomware had existed for several months before the initial attack, yet many organizations failed to implement it.

Vulnerability scanners are not enough, according to an expert who champions an all-encompassing holistic approach to vulnerability management as a means to eliminate surprises. If that's not bad enough, there is confusion surrounding managing vulnerabilities, with most organizations depending on vulnerability scanners and some kind of policy as to when to update or patch the software/hardware.

Effective management of fraud has long been a vital capability within organizations, and for good reasons. According to the Association of Certified Fraud Examiners' 2020 global study on occupational fraud and abuse, companies lose an estimated five percent of revenue per year due to fraud.

The purchase of Singular Key will add to Ping's identity and access management service with a no-code method of creating workflows for identity verification for enterprises. A new acquisition unveiled by identity management firm Ping Identity may be of interest to any business grappling with this challenge.

Cybersecurity frameworks such as ISO 27001, the international framework that defines best practices for an information security management system, can help organizations tackle business risk and enhance overall cyber-defense. In addition to ISO 27001, there are several other frameworks to consider, including the National Institute of Standards and Technology Cybersecurity Framework, which offers in-depth support to help enterprises identify the necessary actions to address and decrease risk.

To select a suitable data privacy management solution for your business, you need to think about a variety of factors. Modern data governance and privacy isn't just about documentation and compliance, done well it empowers teams with consistent, trusted data and delivers measurable value for the entire organization.