Security News

Evaluating your organization’s application risk management journey
2024-11-12 05:30

In this Help Net Security interview, Chris Wysopal, Chief Security Evangelist at Veracode, discusses strategies for CISOs to quantify application risk in financial terms. Wysopal outlines the need...

Third-party risk management is under the spotlight
2024-08-29 03:00

In the aftermath of the CrowdStrike IT outage, new research has uncovered a critical vulnerability within financial institutions regarding supply chain resilience. The outage has demonstrated the...

How to design a third-party risk management framework
2024-07-12 04:30

An effective third-party risk management framework ensures that an organization is not derailed by vendor risks and vulnerabilities. Right after you categorize your third-party vendors based on their importance to your organization, next you must define the scope of your third-party risk management services and framework by identification of the type of third parties involved and the risk factors posed by them.

Develop Valuable Security and Risk Management Skills for Just $30 Through 7/21
2024-07-09 11:15

For either case, you can now develop information security skills with the help of The CISSP Security & Risk Management Training Bundle for just $29.97 through July 21. CISSP: Security & Risk Management covers the security concepts that provide the foundation for all of the other domains.

The complexities of third-party risk management
2024-05-08 03:30

In this Help Net Security video, Brad Hibbert, Chief Strategy Officer and Chief Operating Officer for Prevalent, discusses five interesting findings from a recent industry study on third-party risk management and what he thinks they mean for cybersecurity professionals and their companies' TPRM programs. Prevalent's 2024 Third-Party Risk Management Study found that 61% of companies experienced a third-party data breach or cybersecurity incident last year.

Risk Management Policy
2024-03-18 16:00

Risk management involves the practice of addressing and handling threats to the organization in the form of cybersecurity attacks and compromised or lost data. The process of establishing appropriate risk management guidelines is critical to ensure company operations and reputation do not suffer adverse impacts.

Combined Security Practices Changing the Game for Risk Management
2024-02-05 13:19

A significant challenge within cyber security at present is that there are a lot of risk management platforms available in the market, but only some deal with cyber risks in a very good way. The...

Third-party risk management best practices and why they matter
2024-01-29 05:50

With organizations increasingly relying on third-party vendors, upping the third-party risk management game has become imperative to prevent the fallout of third-party compromises. Why you must do TPRM. Third-party risk management offers numerous advantages for companies.

Key elements for a successful cyber risk management strategy
2024-01-15 04:30

In this Help Net Security interview, Yoav Nathaniel, CEO at Silk Security, discusses the evolution of cyber risk management strategies and practices, uncovering common mistakes and highlighting key components for successful risk resolution. We hope to find the 'golden' indicator for which risk will eventually lead to a breach, but until that day, security teams need to holistically incorporate several layers of risk factors to determine business risk and drive justifiable communications.

This Free Solution Provides Essential Third-Party Risk Management for SaaS
2023-11-30 11:55

Wing Security recently announced that basic third-party risk assessment is now available as a free product. But it raises the questions of how SaaS is connected to third-party risk management...