Five proven techniques for building effective fraud management

Effective management of fraud has long been a vital capability within organizations, and for good reasons. According to the Association of Certified Fraud Examiners’ 2020 global study on occupational fraud and abuse, companies lose an estimated f… Continue reading Five proven techniques for building effective fraud management

How collaboration between IT pros and senior leaders could drive the future of risk mitigation

What is an acceptable level of risk for IT pros and their organizations? The answer to this question has changed in recent years, with the threat landscape shifting dramatically both due to global events and the increasing sophistication of the attacks… Continue reading How collaboration between IT pros and senior leaders could drive the future of risk mitigation

Cybercrime awareness heightened, yet people still engage in risky online behaviors

76% of Americans recognize that data breaches are serious, showing a high awareness that may be driven by news of major consumer, enterprise, and infrastructure breaches over the past year alone, according to a survey of over 2,000 U.S. adults conducte… Continue reading Cybercrime awareness heightened, yet people still engage in risky online behaviors

Three areas legal leaders should focus their technology efforts in

As legal and compliance teams have faced acute pressures since the global pandemic and are struggling to manage their workload, legal leaders should focus their technology efforts in three areas to derive the maximum benefit, according to Gartner. “Tec… Continue reading Three areas legal leaders should focus their technology efforts in

Third-party risk prevention strategies inadequate despite organizations being aware of the threats

While organizations recognize third-party threats expose them to great risk, many organizations fail to take adequate measures to mitigate it. In fact, while they grapple with third-party cyber risk management (TPCRM), the weak points in their current … Continue reading Third-party risk prevention strategies inadequate despite organizations being aware of the threats

Ransomware attacks on healthcare organizations may have life-or-death consequences

Ponemon Institute surveyed 597 IT and IT security professionals to understand how COVID-19 has impacted how healthcare delivery organizations (HDOs) protect patient care and patient information from increasing virulent cyberattacks, especially ransomwa… Continue reading Ransomware attacks on healthcare organizations may have life-or-death consequences

Certificates volume growing, most enterprises considering PKI automation to reduce risks

The typical enterprise manages over 50,000 publicly and privately trusted PKI certificates, a DigiCert survey shows. Manually managing this volume of certificates can lead to costly outages if not handled correctly. Two-thirds have experienced outages … Continue reading Certificates volume growing, most enterprises considering PKI automation to reduce risks

Assessing subsidiary risk a top priority for most enterprises, yet they still lack proper visibility

Most enterprises are overconfident and lack the proper visibility to manage subsidiary risk, according to an Osterman Research study. The study surveyed enterprises with more than $1 billion in annual revenue and an average of more than 19 subsidiaries… Continue reading Assessing subsidiary risk a top priority for most enterprises, yet they still lack proper visibility

CNP transaction fraud costing merchants millions in revenue, fraudsters getting more sophisticated

Vesta released a report which includes an analysis of millions of digital transactions from the first quarter of 2020 through the first quarter of 2021 to track how CNP fraud evolved during that time frame. The overall percentage of global transactions… Continue reading CNP transaction fraud costing merchants millions in revenue, fraudsters getting more sophisticated