Tag: risk-management
-
OAuth-Token-Leck Weckruf für Supply-Chain-Risikomanagement
Cloud-Dienste und SaaS-Anwendungen sind aus dem Unternehmensalltag nicht mehr wegzudenken. Sie steigern Effizienz, vereinfachen Prozesse und ermöglichen flexible Zusammenarbeit. Gleichzeitig entstehen jedoch immer komplexere Integrationen zwischen verschiedenen Plattformen und genau diese Schnittstellen entwickeln sich zunehmend zu einem kritischen Einfallstor für Angriffe. Wer die Vorteile der Cloud nutzt, muss daher auch die wachsenden Sicherheitsrisiken im […]…
-
Enterprise Security and Digital Transformation in 2025 Navigating Risks and Opportunities
Explore how enterprise security aligns with digital transformation in 2025, leveraging AI, cloud, and risk management for resilient growth. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/enterprise-security-and-digital-transformation-in-2025-navigating-risks-and-opportunities/
-
Neuer Ansatz für Cyber-Risikomanagement – Warum Exposure Management das Schwachstellen-Management ablöst
First seen on security-insider.de Jump to article: www.security-insider.de/posure-management-vs-vulnerability-management-a-f2e53703d4ab18232d4e404a6c4c7314/
-
AI Regulations Frameworks: Building Risk Readiness – Kovrr
Articles related to cyber risk quantification, cyber risk management, and cyber resilience. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/ai-regulations-frameworks-building-risk-readiness-kovrr/
-
Organizations Must Update Defenses to Scattered Spider Tactics, Experts Urge
Experts at a Gartner event highlighted areas of focus in identity, processes and third-party risk management to tackle the novel tactics employed by Scattered Spider First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/update-defenses-scattered-spider/
-
CSO Awards winners highlight security innovation and transformation
Tags: ai, attack, automation, awareness, best-practice, business, ciso, cloud, compliance, conference, control, cyber, cybersecurity, data, defense, detection, finance, flaw, framework, governance, group, guide, infrastructure, intelligence, login, malicious, metric, mitre, network, penetration-testing, phishing, privacy, programming, risk, risk-management, service, siem, skills, soc, software, technology, threat, tool, training, update, vulnerability, vulnerability-managementFSU tackles third-party risk with tighter vendor management program: Organization: Florida State UniversityProject: Third-Party Risk Management ProgramSecurity leader: Bill Hunkapiller, CISOOfficials at Florida State University wanted to ensure that data shared with outside entities was well protected. To achieve that, CISO Bill Hunkapiller and his team revamped its third-party risk management program so that the…
-
Forrester Research stuft Claroty als Leader im Bereich IoT-Sicherheit ein
Der Spezialist für die Sicherheit von cyberphysischen Systemen (CPS), Claroty, wurde von Forrester Research im neuen Report ‘The Forrester Wave: IoT Security Solutions, Q3 2025″ als ‘Leader” eingestuft. In dem Bericht erhielt Claroty die höchstmögliche Punktzahl in zehn Kategorien: Geräteidentifizierung und -klassifizierung, Schwachstellenbewertung und -behebung, Risikomanagement für IoT-Infrastrukturen, Netzwerksegmentierung und Mikrosegmentierung, Überwachung und Management der…
-
Forrester Research stuft Claroty als Leader im Bereich IoT-Sicherheit ein
Der Spezialist für die Sicherheit von cyberphysischen Systemen (CPS), Claroty, wurde von Forrester Research im neuen Report ‘The Forrester Wave: IoT Security Solutions, Q3 2025″ als ‘Leader” eingestuft. In dem Bericht erhielt Claroty die höchstmögliche Punktzahl in zehn Kategorien: Geräteidentifizierung und -klassifizierung, Schwachstellenbewertung und -behebung, Risikomanagement für IoT-Infrastrukturen, Netzwerksegmentierung und Mikrosegmentierung, Überwachung und Management der…
-
KnowBe4 Report Reveals UK Retail Sector on High Alert for Cyber Scams
KnowBe4, the human risk management platform, has released a new report entitled IT and Cybersecurity Trends in UK Retail: 2025 Survey Insights. The findings revealed nearly all (99.6%) of the 250 UK retail IT security professionals surveyed are facing a significant increase in cyber threats. Notably, 58% cited an increase in helpdesk/IT support scams that…
-
Build Cyber Resilience With a Control Assessment – Kovrr
Articles related to cyber risk quantification, cyber risk management, and cyber resilience. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/build-cyber-resilience-with-a-control-assessment-kovrr/
-
Build Cyber Resilience With a Control Assessment – Kovrr
Articles related to cyber risk quantification, cyber risk management, and cyber resilience. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/build-cyber-resilience-with-a-control-assessment-kovrr/
-
Turning Regulation Into an Industry Advantage
Resilionix’s Heather Lowrie on Embracing GDPR as Tool for Change and Resilience. In a modern regulatory environment, compliance is no longer just an exercise in ticking off boxes. Thanks to GDPR, financial services firms are shifting from a reactive mindset to a more proactive approach to compliance that focuses on risk management, said Heather Lowrie,…
-
SecurityScorecard Buys AI Automation Capabilities, Boosts Vendor Risk Management
The company acquired HyperComply to help enterprises automate vendor security reviews and gain a real-time picture of the security of their entire supply chain. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/securityscorecard-buys-ai-automation-capabilities-boosts-vendor-risk-management
-
How Wesco cut through the noise and reimagined risk management
Tags: ai, application-security, automation, awareness, business, conference, container, control, data, defense, detection, exploit, github, intelligence, kubernetes, microsoft, mitigation, risk, risk-management, software, strategy, threat, tool, vulnerability, zero-dayProactive defense: Real-time threat intelligence feeds allow Wesco to spot and neutralize vulnerabilities before they escalate.Improved awareness: Developers and security teams have clearer visibility into zero-day threats and can act faster.Application security posture enhancement: A “security champions program” ensures accountability doesn’t sit only with the security team but across development and executive teams, too.AI-driven risk…
-
Cybersecurity Snapshot: Security Lags Cloud and AI Adoption, Tenable Report Finds, as CISA Lays Out Vision for CVE Program’s Future
Tags: access, ai, api, attack, automation, best-practice, breach, bug-bounty, business, cisa, cloud, communications, computer, control, cve, cyber, cybersecurity, data, data-breach, defense, encryption, exploit, framework, google, governance, government, identity, infrastructure, intelligence, international, Internet, linkedin, mitre, network, nist, office, open-source, privacy, programming, RedTeam, resilience, risk, risk-management, service, skills, software, strategy, tactics, technology, threat, tool, update, vulnerabilityCheck out Tenable’s report detailing challenges and best practices for cloud and AI security. Plus, CISA rolled out a roadmap for the CVE Program, while NIST updated its guidelines for secure software patches. And get the latest on TLS/SSL security and AI attack disclosures! Here are five things you need to know for the week…
-
Fünf KI-Use-Cases für CISOs
Tags: access, ai, business, ceo, cio, ciso, cybercrime, cybersecurity, cyersecurity, data, framework, google, incident response, mail, microsoft, phishing, rat, risk, risk-management, service, siem, soc, tool, vpn, vulnerability, vulnerability-management -
Fünf KI-Use-Cases für CISOs
Tags: access, ai, business, ceo, cio, ciso, cybercrime, cybersecurity, cyersecurity, data, framework, google, incident response, mail, microsoft, phishing, rat, risk, risk-management, service, siem, soc, tool, vpn, vulnerability, vulnerability-management -
Human Risk Management: KnowBe4-Whitepaper verfolgt ganzheitlichen Ansatz
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/human-risk-management-knowbe4-whitepaper-ganzheitlicher-ansatz
-
The Future of Human Risk Management: The Zensory and Brigantia Partnership A Year On
Cybersecurity distributor Brigantia and The Zensory, the popular wellbeing and productivity platform dedicated to transforming work habits, have been working together for a whole year now. The partnership set out with a hefty aim: to tackle one of the biggest threats in cybersecurity human error. No small feat. Reporting on the success of the The…
-
Vanta introduces Vanta AI Agent for risk management
Vanta, the trust management platform, has announced a new set of capabilities that embed AI across core compliance and risk workflows. The expanded capabilities unify policy management with Vanta AI Agent, continuous monitoring for vendors, risk oversight, and deeper integrations, providing security leaders with a single system of record to act on risk before it…
-
CodeCloud Visibility: Why Fragmented Security Can’t Scale
Tags: ai, api, best-practice, business, ciso, cloud, container, data, flaw, identity, infrastructure, kubernetes, risk, risk-management, service, strategy, threat, tool, vulnerability, vulnerability-managementWidespread visibility is critical for cloud security, but obtaining it is easier said than done. To discover insights and best practices for code-to-cloud visibility, check out highlights from a new IDC white paper. Plus, learn how Tenable’s CNAPP and exposure management platform give you an unimpeded view of your multi-cloud and hybrid environment. The modern…
-
Shift from Reactive to Proactive: Leveraging Tenable Exposure Management for MSSP Success
Tags: access, ai, api, application-security, attack, best-practice, breach, business, cloud, compliance, control, cyber, cybersecurity, data, endpoint, exploit, framework, guide, identity, infrastructure, iot, mitre, mssp, risk, risk-management, service, technology, threat, tool, vulnerability, vulnerability-managementAn Exposure Management as a Service offering allows MSSPs to unify security visibility, insight and action across the attack surface to prioritize exposure and enable innovation that is secure and compliant. Whether you’re already leveraging Tenable Vulnerability Management as a Service or you’re just starting a service offering, we’ve got guidance for you. Key takeaways…
-
Why organizations need a new approach to risk management
To succeed in the risk environment, risk, audit, and compliance leaders need to focus on what Gartner calls “reflexive risk ownership.” This is a future state where business … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/09/11/gartner-organizational-risk-management-strategy/
-
Drittanbieter als Risiko: Wie Angreifer Lieferketten ins Visier nehmen
Nur eine kontinuierliche Überwachung aller Schnittstellen und Perimeter ermöglicht es, riskantes Verhalten, Fehlkonfigurationen oder ungepatchte Schwachstellen frühzeitig zu erkennen und sofort zu reagieren. Mit modernen Lösungen für das Third-Party Risk Management (TPRM) können Unternehmen das Risiko von sicherheitsrelevanten Vorfällen durch Dritte deutlich senken. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/drittanbieter-als-risiko-wie-angreifer-lieferketten-ins-visier-nehmen/a41943/
-
71% of CISOs hit with third-party security incident this year
Tags: access, ai, application-security, attack, backdoor, breach, ceo, cisa, ciso, cloud, compliance, control, credentials, cyber, cybersecurity, data, defense, exploit, incident response, intelligence, malicious, malware, open-source, penetration-testing, phishing, programming, pypi, resilience, risk, risk-management, sbom, security-incident, service, software, startup, supply-chain, threat, toolSoftware supply chain threats: The software supply chain is heavily reliant on code developed by third-party developers, something only likely to increase with the advent of AI.Brian Fox, co-founder and CTO of open-source software security vendor Sonatype, says that “enormously complex” software supply chains pose a growing threat.”Too many organizations have no idea what open-source…
-
5 ways CISOs are experimenting with AI
Tags: ai, attack, awareness, breach, business, ceo, cio, ciso, control, cyber, cybersecurity, data, data-breach, detection, email, finance, framework, incident response, intelligence, login, metric, microsoft, monitoring, phishing, qr, risk, risk-assessment, risk-management, service, siem, soc, technology, threat, tool, update, vpn, vulnerability, vulnerability-managementTranslating security metrics into business language: CISOs are now tasked with being the security storyteller, and it doesn’t always come easily. Turning to AI, CISOs are finding a helping hand to translate technical detail into business-oriented narratives, drawing on a range of data sources, risk trends, control gaps and threat modeling.AI tools are helping tailor…
-
71% of CISOs hit with third-party security incident this year
Tags: access, ai, application-security, attack, backdoor, breach, ceo, cisa, ciso, cloud, compliance, control, credentials, cyber, cybersecurity, data, defense, exploit, incident response, intelligence, malicious, malware, open-source, penetration-testing, phishing, programming, pypi, resilience, risk, risk-management, sbom, security-incident, service, software, startup, supply-chain, threat, toolSoftware supply chain threats: The software supply chain is heavily reliant on code developed by third-party developers, something only likely to increase with the advent of AI.Brian Fox, co-founder and CTO of open-source software security vendor Sonatype, says that “enormously complex” software supply chains pose a growing threat.”Too many organizations have no idea what open-source…
-
5 ways CISOs are experimenting with AI
Tags: ai, attack, awareness, breach, business, ceo, cio, ciso, control, cyber, cybersecurity, data, data-breach, detection, email, finance, framework, incident response, intelligence, login, metric, microsoft, monitoring, phishing, qr, risk, risk-assessment, risk-management, service, siem, soc, technology, threat, tool, update, vpn, vulnerability, vulnerability-managementTranslating security metrics into business language: CISOs are now tasked with being the security storyteller, and it doesn’t always come easily. Turning to AI, CISOs are finding a helping hand to translate technical detail into business-oriented narratives, drawing on a range of data sources, risk trends, control gaps and threat modeling.AI tools are helping tailor…

