The top 10 API security risks OWASP list for 2023

As more organizations rely on the automation and scale that web applications and connected services provide, application programming interface (API) security has become imperative. In just the last year alone, unique attackers targeting customer APIs grew by 400%, proving that organizations must take a proactive approach to secure these increasingly valuable services. But considering the […]

The post The top 10 API security risks OWASP list for 2023 appeared first on Security Intelligence.

Continue reading The top 10 API security risks OWASP list for 2023

Digital Transformation and Risk Management Must Go Together

The recent PwC 2022 Global Risk Survey gives a glimpse into what senior leaders think about their business efforts. The report opens with some expected highlights worth repeating:  Change is increasingly fast and disruptive The COVID-19 pandemic caused disturbances in the labor and supply markets Geopolitical risk is on the rise New regulations, including an […]

The post Digital Transformation and Risk Management Must Go Together appeared first on Security Intelligence.

Continue reading Digital Transformation and Risk Management Must Go Together

Changing the Conversation with Risk Quantification

“Quantitative risk analysis is the single most effective way to align security with business priorities and establish credibility with teams.” — U.S.-based CISO As organizations continue to leverage the latest technologies and move toward even greater interconnectivity in the pursuit of growth, business strategy and cybersecurity continue to converge. Cybersecurity concerns now extend beyond the […]

The post Changing the Conversation with Risk Quantification appeared first on Security Intelligence.

Continue reading Changing the Conversation with Risk Quantification

Private 5G Security: Consider Security Risks Before Investing

So, 5G is one of those once-in-a-generation types of leaps that will alter how we operate. However, 5G security comes with a lot of challenges. Private 5G networks require us to look at attack surface management in a different way. How do they change the way we need to defend our data? And, what is […]

The post Private 5G Security: Consider Security Risks Before Investing appeared first on Security Intelligence.

Continue reading Private 5G Security: Consider Security Risks Before Investing

How to Quantify the Actual Cost of a Data Breach for Your Own Organization

As business leaders, we need to know what the biggest risks to our organizations are. All organizations face numerous disruptive challenges in today’s business environment that can create significant new business opportunities, but also can increase potential cybersecurity risks to the organizations. To address these issues, we need to focus our scarce resources on those […]

The post How to Quantify the Actual Cost of a Data Breach for Your Own Organization appeared first on Security Intelligence.

Continue reading How to Quantify the Actual Cost of a Data Breach for Your Own Organization

Driving the Desire for FAIR: What Is Your ‘Why’ for Security Risk Quantification?

One of the first questions I ask when working with an organization is “Why are you interested in making FAIR (Factor Analysis of Information Risk) a part of your standard risk management practice?” The answer is different for every client, and that truly highlights the value of risk quantification. We can apply risk quantification to […]

The post Driving the Desire for FAIR: What Is Your ‘Why’ for Security Risk Quantification? appeared first on Security Intelligence.

Continue reading Driving the Desire for FAIR: What Is Your ‘Why’ for Security Risk Quantification?

Using FAIR and NIST CSF for Security Risk Management

Risk management and risk assessments go hand in hand, and most organizations have completed a security assessment based on maturity models at some point in their existence. However, more companies are realizing the need to complement maturity models with a risk-based approach for assessing their cybersecurity positions. One such risk-based approach is based on the […]

The post Using FAIR and NIST CSF for Security Risk Management appeared first on Security Intelligence.

Continue reading Using FAIR and NIST CSF for Security Risk Management

Huawei Controversy Highlights 5G Security Implications

Security experts say that 5G supply chain concerns should be taken seriously – whether it’s in the context of Huawei or not. Continue reading Huawei Controversy Highlights 5G Security Implications

Survey Says Quantum Computing a Cybersecurity Threat

Now that quantum computers are moving from theory into the realm of experimental, many cybersecurity professionals are starting to appreciate a simple fact: Computers capable of cracking the most sophisticated encryption algorithms are on the horizon…. Continue reading Survey Says Quantum Computing a Cybersecurity Threat

Take a Fresh Look at Your Annual Security Risk Assessment

The importance of a security risk assessment is clear: It helps healthcare organizations ensure their physical, technical and administrative safeguards are compliant with HIPAA requirements. It also assists in showing areas where an organization might… Continue reading Take a Fresh Look at Your Annual Security Risk Assessment