Are we getting better at quantifying risk management?

As cyber threats grow more sophisticated and pervasive, the need for effective risk management has never been greater. The challenge lies not only in defining risk mitigation strategy but also in quantifying risk in ways that resonate with business leaders. The ability to translate complex technical risks into understandable and actionable business terms has become […]

The post Are we getting better at quantifying risk management? appeared first on Security Intelligence.

Continue reading Are we getting better at quantifying risk management?

Are we getting better at quantifying risk management?

As cyber threats grow more sophisticated and pervasive, the need for effective risk management has never been greater. The challenge lies not only in defining risk mitigation strategy but also in quantifying risk in ways that resonate with business leaders. The ability to translate complex technical risks into understandable and actionable business terms has become […]

The post Are we getting better at quantifying risk management? appeared first on Security Intelligence.

Continue reading Are we getting better at quantifying risk management?

The most common authentication method is also the least secure

Despite the rise in cyber threats, many people do not have a holistic view of security, according to Yubico. The results of the survey uncovered concerning patterns and behaviors when it comes to personal and workplace cybersecurity, including the exte… Continue reading The most common authentication method is also the least secure

Companies mentioned on the dark web at higher risk for cyber attacks

The presence of any data relating to an organization on the dark web demonstrably increases its risk of a cyber attack, according to Searchlight Cyber. Dark web insights and breach correlation Marsh McLennan Cyber Risk Intelligence Center analyzed the … Continue reading Companies mentioned on the dark web at higher risk for cyber attacks

Organizations are changing cybersecurity providers in wake of Crowdstrike outage

More often than not, a cyber attack or a cyber incident that results in business disruption will spur organizations to make changes to improve their cybersecurity and cyber resilience – and sometimes that means changing cybersecurity providers. T… Continue reading Organizations are changing cybersecurity providers in wake of Crowdstrike outage

Organizations overwhelmed by numerous and insecure remote access tools

Organizations are combating excessive remote access demands with an equally excessive number of tools that provide varying degrees of security, according to Claroty. Data from more than 50,000 remote-access-enabled devices showed that the volume of rem… Continue reading Organizations overwhelmed by numerous and insecure remote access tools

What can businesses learn from the rise of cyber espionage?

It’s not just government organizations that need to worry about cyber espionage campaigns — the entire business world is also a target. Multipolarity has been a defining trend in geopolitics in recent years. Rivalries between the world’s great powers continue to test the limits of globalism, resulting in growing disruption to international supply chains and […]

The post What can businesses learn from the rise of cyber espionage? appeared first on Security Intelligence.

Continue reading What can businesses learn from the rise of cyber espionage?

The future of automotive cybersecurity: Treating vehicles as endpoints

The automotive industry is facing many of the same cybersecurity risks and threats that successful organizations in other sectors are up against, but it’s also battling some distinct ones. In this Help Net Security interview, Josh Smith, Principal Thre… Continue reading The future of automotive cybersecurity: Treating vehicles as endpoints

CISOs list human error as their top cybersecurity risk

With cybersecurity, the focus often is on technology — specifically, how cyber criminals use it to conduct attacks and the tools that organizations can use to keep their systems and data safe. However, this overlooks the most important element in cybersecurity risk: human error. Human risk in cybersecurity Proofpoint’s 2024 Voice of the CISO report […]

The post CISOs list human error as their top cybersecurity risk appeared first on Security Intelligence.

Continue reading CISOs list human error as their top cybersecurity risk

Researchers expose GitHub Actions workflows as risky and exploitable

GitHub is an immensely popular platform, with over 100 million developers and over 90% of Fortune 100 companies utilizing it. Despite its widespread use, many GitHub Actions workflows remain insecure, often due to excessive privileges or high-risk depe… Continue reading Researchers expose GitHub Actions workflows as risky and exploitable