Security News

Combined Security Practices Changing the Game for Risk Management
2024-02-05 13:19

A significant challenge within cyber security at present is that there are a lot of risk management platforms available in the market, but only some deal with cyber risks in a very good way. The...

Third-party risk management best practices and why they matter
2024-01-29 05:50

With organizations increasingly relying on third-party vendors, upping the third-party risk management game has become imperative to prevent the fallout of third-party compromises. Why you must do TPRM. Third-party risk management offers numerous advantages for companies.

Key elements for a successful cyber risk management strategy
2024-01-15 04:30

In this Help Net Security interview, Yoav Nathaniel, CEO at Silk Security, discusses the evolution of cyber risk management strategies and practices, uncovering common mistakes and highlighting key components for successful risk resolution. We hope to find the 'golden' indicator for which risk will eventually lead to a breach, but until that day, security teams need to holistically incorporate several layers of risk factors to determine business risk and drive justifiable communications.

Develop Valuable Security and Risk Management Skills for Just $30 Through 1/1
2023-12-29 10:00

With cyberthreats and cyberattacks always on the rise, developing security and risk management skills could be one of the best moves for your business or career. For either case, you can now develop information security skills with the help of The 2023 CISSP Security & Risk Management Training Bundle for just $29.97 through January 1.

This Free Solution Provides Essential Third-Party Risk Management for SaaS
2023-11-30 11:55

Wing Security recently announced that basic third-party risk assessment is now available as a free product. But it raises the questions of how SaaS is connected to third-party risk management...

Organizations’ serious commitment to software risk management pays off
2023-11-21 04:30

There has been a significant decrease in vulnerabilities found in target applications - from 97% in 2020 to 83% in 2022 - an encouraging sign that code reviews, automated testing and continuous integration are helping to reduce common programming errors, according to Synopsys. The report details three years of data derived from tests run by Synopsys Security Testing Services, with targets made up of web applications, mobile applications, network systems and source code.

A third-party’s perspective on third-party InfoSec risk management
2023-04-24 04:30

In the complex and fast-moving world of cybersecurity-meets-regulations, working with third parties requires diligent third-party risk management oversight to monitor data management and processes. Improving InfoSec risk management can provide insights into how data is handled, the security safeguards in place to protect that data, potential security weaknesses, and better adherence to the multitude of data, security, and privacy regulations.

Re-evaluating immature and ineffective insider risk management programs
2023-04-05 03:00

Although more than 72% of companies indicate they have an Insider Risk Management program in place, the same companies experienced a year-over-year increase in data loss incidents of 32%, and 71% expect data loss from insider events to increase in the next 12 months. With insider incidents costing organizations $16M per incident on average, and CISOs stating that insider risks are the most challenging type of threat to detect, the report is a clear call to action for the security industry to 'do better' and help professionals solve this challenge.

Risk management policy
2023-03-08 11:00

TechRepublic Premium Offshore work policy It's common practice for companies to use offshore employees or contractors in order to offload work to specialized individuals or reduce costs associated with certain tasks and responsibilities. This can free up staff to focus on more complex and valuable initiatives, and also ensure 24×7 operations for companies which rely upon on-call staff and subject-matter .....

3 Steps to Automate Your Third-Party Risk Management Program
2023-02-22 11:03

The reasons for the lack of investment into Third Party Risk Management are the same that we consistently hear - lack of time, lack of money and resources, and it's a business need to work with the vendor. Step 3 - Continuously combine threat exposure findings with the questionnaire exchange #. Security ratings alone don't work.