Tag: Risks
-
#BHEU: Did the ‘Grain of Rice Chip’ Drive New Risk Assessments?
Speaking at the Black Hat Europe conference in London, trainer and researcher Joe FitzPatrick from SecuringHardware.com asked delegates if …
-
Scaling a governance, risk, and compliance program for the cloud, emerging technologies, and innovation
Governance, risk, and compliance (GRC) programs are sometimes looked upon as the bureaucracy getting in the way of exciting cybersecurity …
-
Cross-Industry Approaches to Managing Potentially Catastrophic Cyber Risks
The other day I was reading a history of the events leading up to the Challenger space shuttle disaster, which got me thinking of the ways …
-
Manipulated White House Video Exposes Real Risks to Enterprises
On Nov. 7, CNN reporter Jim Acosta got into a heated discussion at a White House press conference with President Donald Trump over Russian …
-
Incorrect Assessments of Data Value Putting Organizations at Risk
Many information security groups are undermining data availability and security by incorrectly estimating the true value of their …
-
Article: 3 Keys to a Successful “Pre-Mortem”
Talking about what might go wrong acknowledges many things are out of our control, and that we might mess up the things which are within …
-
C-Suite: GDPR Could Lead to Greater Risk of Breaches
Almost a quarter of UK and German businesses (23%) believe the GDPR may have resulted in a greater risk of data breaches, six months after …
-
Fugue Risk Manager protects against data breaches with self-healing cloud infrastructure
A Software-as-a-Service (SaaS) offering, Fugue Risk Manager can identify compliance violations in cloud environments and remediate …
-
Silverfort’s Risk Engine secures corporate identities without impacting usability
Silverfort launched AI-based risk engine that analyzes activities across all on-premises and cloud environments, to calculate risk score …
-
Managing the Risks Posed by Automotive Smartphone Apps
Automotive smartphone apps that can be used to unlock or start a car pose new risks that must be managed, says Asaf Ashkenazi of Inside …
-
Node.js Event-Stream Hack Exposes Supply Chain Security Risks
Modern applications are often built with a jigsaw puzzle array of different pieces that all fit together to enable a full stack of …
-
Hacking Your Ride: Risks Posed by Automotive Smartphone Apps
In the latest edition of the ISMG Security Report, Asaf Ashkenazi of mobile security firm Inside Secure discusses new threats to car …
●●●