Risk management stories
A practical approach to modern Data Security
Your data is your most valuable asset, and safeguarding it with confidence comes down to having the right partnerships
CyberArk unveils AI Center of Excellence for cybersecurity
93% of security professionals surveyed expect AI-enabled threats to affect their organisation in 2023, with AI-powered malware cited as the top concern.
Check Point to acquire SaaS security vendor Atmosec
The technology will help discover malicious applications, prevent communication with risky 3rd party applications and fix SaaS misconfigurations.
Statistics shock as threats to mobile devices escalate
Diverse devices are accessing corporate data, including employee-owned mobile phones and other devices that aren’t managed by corporate IT teams.
Fines for mismanagement of data expected to reach $1Bn
“For security and risk management leaders in B2C organisations, automating subject rights or consumer privacy rights management has become a basic requirement."
Data leaders should balance governance and innovation: Qlik
New research shows public sector organisations value data, but governance and compliance are taking over as the primary responsibilities of data leaders.
Qualys unveils first-party software risk management solution
The new solution aids security teams to detect, prioritise and remediate vulnerabilities within company-developed software and embedded open-source components.
Why fuzzing is an insufficient method for testing your APIs
One of the common techniques used in software testing to identify potential vulnerabilities or bugs in a programme is fuzzing.
Cultivating resilience: Developing a robust supply network
Investing in resilience is not only a strategic imperative but also a responsibility to stakeholders and broader society.
Automation and AI in the law sector: threat or opportunity?
AI and automation can help accelerate the productivity of existing teams, enabling firms to make the most of their resources and boost their overall efficiency.
The three-stage path to a more secure IT environment
By adopting a graduated and nuanced approach to privileged access management, organisations can emerge better placed to secure their environments against the rising tide of attacks.
Navigating the complexities of FX hedging and risk management
Hedging is an essential part of any risk management strategy. However, misconceptions about foreign exchange (FX) hedging and risk may lead to missed opportunities.
Best practices for enterprise application security in the cloud
Cloud application security best practices require a comprehensive approach to secure not only the application but also the infrastructure it runs on.
Visibility over spending increasingly important - Portt
The growing trend toward increased visibility into organisational spending is shaping the procurement landscape, enabling more informed and data-driven decision making.
Changing the way the MOD manages cyber resilience for the better
With the increasing cyber threats that exist, our cyber security processes must be able to adapt accordingly, ensuring we are always ahead of our adversaries.
Cequence Security updates to UAP platform to better manage risk
"We are always exploring ways to further automate and improve our UAP solution and help our customers consolidate the tools required to stay ahead of the threat actors."
How to build a more secure and resilient supply chain
A supply chain attack can occur in any industry and can impact a business indirectly, damaging its reputation and eroding customer trust.
Data streaming delivers 2-10x ROI for businesses: Confluent
In the most extensive survey, Confluent finds that 54% of Australian organisations are powering five or more critical systems with data streaming.
CyberSmart defends MSPs against threatening cyber landscape
The company has offered its managed service provider partners free Cyber Essentials and access to CyberSmart’s risk management tool.
Vanta powers third-party vendor security with latest launch
Vanta has announced the launch of its Vendor Risk Management solution, enabling organisations to accelerate, automate and simplify third-party vendor security reviews and due diligence.
Managing cybersecurity risk in a transformational landscape
Everything we do now is surrounded by data, tracked by applications, systems and devices that describe us in granular detail.
Action1 Corporation enhances patch management platform with new features
Action1 Corporation is looking to add vulnerability discovery and prioritisation based on IT asset value to its patch management capabilities.
New Cybersecurity approaches for staying ahead of threats
This year, we will see a significant rise in data breaches that will directly impact everyday life as the scale of cyber threats grows, spilling into the mainstream.
Agility and scalability are the keys to successful enterprise IT in 2023
Enterprise IT is a true challenge in 2023. CTOs and their teams are continually being asked to do more with less, and it feels like being in such teams is a thankless role at times.