Blog
Page 78 of 152
Enterprise Risk Management for Cloud Computing
Businesses have always had to manage risk – everything from operational, financial, or strategic risks; to other risks that are reputational, regulatory, or cybersecurity-related. So how does enterprise risk management (ERM) work today, when so many businesses are moving so much of their operations into the cloud? How can CISOs and other senior executives take […]
January 13, 2022
What Is DNS Spoofing?
A DNS spoofing attack is a common tactic for man-in-the-middle (MITM) attacks. Hackers use DNS spoofing to intercept communication between two targets. The hackers change a legitimate website’s domain name system (DNS) records so users are redirected to a fake website, typically by hijacking a DNS server. This malicious website dupes users into entering their […]
Assess Your Enterprise Risk Management Maturity in 6 Simple Steps
BEFORE AD-HOC RISK MANAGEMENT THREATENS YOUR BUSINESS GROWTH Is your organization losing contracts because you’re not compliant with relevant regulations? Are you concerned about the security of your data now that your employees are working remotely? These are red flags of an ad-hoc risk management program. Such an approach to enterprise risk management can threaten […]
January 12, 2022
Don’t Let Supply Chain Attacks Get the Best of You
The past two years have brought about significant disruptions to global supply chains. Recent headlines have focused on labor shortages and their impact on everything from product production to shipping delays. However, another, more significant supply chain issue should be top of mind for every organization: supply chain attacks. Compromising a business supply chain is […]
January 10, 2022
What You Should Know About the Rise in AWS S3 Security Data Breaches
Amazon Web Services (AWS) is a cloud platform designed to meet the growing demand for cloud computing worldwide. AWS provides a set of cloud services such as storage, analytics, blockchain, business applications, security, and machine learning. Within this cloud environment is Amazon Simple Storage Services (S3), a cloud storage solution bringing scalability, data availability, security, […]
January 6, 2022
Fourth Party Risk Management Explained
Most organizations use at least some (and perhaps many) external vendors in their daily operations, sometimes even to provide mission-critical services or supplies; we’ve discussed them before as third-party vendors and the risks they bring. Indeed, most businesses today already consider third-party risk management in their overall cybersecurity protocols. An equally pressing concern, however, is […]
Digital Banking: Challenges & Opportunities
Digital banking has become more and more over the years, and the COVID-19 pandemic only underlined the need for convenient, contact-free financial institutions. Customers now expect that digital banking will be available to them, regardless of where they do their banking. That demand has put pressure on many banks to expand their digital offerings and […]
5 Tips to Preventing Data Leakage in 2022
In today’s world, where customers and app users are increasingly aware of the personal information they provide to companies and seek to limit the amount of data they share online, data leaks can be devastating to the organizations that suffer them. A data leak differs from a data breach in that cyber criminals take no […]
What Is a Risk Heat Map, and How Can It Help Your Risk Management Strategy
A robust, cohesive risk management strategy is critical to the success of any cybersecurity plan. The enterprise risk management (ERM) framework created by the Committee of Sponsoring Organizations (COSO) articulates a number of principles and tactics that can help you develop such an enterprise risk management plan, and one recommended tool is a risk heat […]
Cybersecurity Risk: A Top Issue in the Boardroom
FINDINGS FROM A CYBERRISK ALLIANCE (CRA) RESEARCH STUDY Risk management has risen significantly on the board of directors’ radar from a compliance requirement checklist item to one of the many pillars required to ensure a corporation can manage security risk. A survey conducted by CyberRisk Alliance among 252 senior-level IT executives identified several areas that […]
January 5, 2022
Page 78 of 152