Tag: risk-management
-
5 hard truths of a career in cybersecurity, and how to navigate them
Tags: access, ai, application-security, attack, awareness, best-practice, breach, business, cio, ciso, conference, control, cyber, cybersecurity, data-breach, finance, firewall, framework, gartner, identity, ISO-27001, jobs, mitigation, network, regulation, risk, risk-assessment, risk-management, skills, strategy, technology, threat, training, wafCybersecurity teams protect systems but neglect people: After all the effort it takes to break into cybersecurity, professionals often end up on teams that don’t feel welcoming or supportive.Jinan Budge, a research director at Forrester who focuses on enabling CISOs and other technical leaders, believes the way most cybersecurity career paths are structured plays a…
-
Top cybersecurity M&A deals for 2025
Tags: 5G, access, ai, api, apple, application-security, attack, automation, awareness, banking, breach, business, ceo, cisco, cloud, compliance, control, crowdstrike, cyber, cybersecurity, data, ddos, defense, detection, edr, email, endpoint, finance, firewall, gitlab, government, group, ibm, identity, incident response, infrastructure, intelligence, leak, microsoft, mitigation, network, password, programming, risk, risk-management, saas, service, software, sophos, strategy, supply-chain, technology, threat, tool, training, vulnerability, waf, zero-trustPalo Alto Networks to buy CyberArk for $25B as identity security takes center stage July 30, 2025: Palo Alto Networks is making what could be its biggest bet yet by agreeing to buy Israeli identity security company CyberArk for around $25 billion. “We envision Identity Security becoming the next major pillar of our multi-platform strategy, complementing our leadership…
-
NIST Risk Assessment Template: A Step-by-Step Guide to Effective Risk Management
Key Takeaways The Disconnect Between Cyber Risk and Business Strategy If you’re wondering why risk assessments often feel disconnected from business strategy, you’re not alone. ISACA and PwC have both found that even in well-resourced organizations, critical gaps remain: This lack of operational clarity stems often from the absence of a structured, repeatable approach to……
-
So verändert KI Ihre GRC-Strategie
Tags: ai, ciso, compliance, cyersecurity, framework, fraud, governance, grc, group, monitoring, nist, risk, risk-management, strategy, tool -
AIBOMs are the new SBOMs: The missing link in AI risk management
In this Help Net Security interview, Marc Frankel, CEO at Manifest Cyber, discusses how overlooked AI-specific risks, like poisoned training data and shadow AI, can lead to … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/08/04/marc-frankel-manifest-cyber-aiboms-sboms/
-
Safe Raises $70M Series C to Scale Cyber Risk Management
New Funding, Platform Expansion Aim for Predictive, Autonomous Threat Defense. Safe’s $70 million Series C will fund expanded capabilities across its cyber risk quantification, exposure management and third-party oversight tools. The company says its agentic AI vision cyber AGI will transform how enterprises manage and mitigate cyberthreats. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/safe-raises-70m-series-c-to-scale-cyber-risk-management-a-29109
-
Noma Raised $100M to Expand Agentic AI Security Platform
Red-Hot Startup Noma Security to Deepen Protection for AI Models and Agents. With agentic AI deployments accelerating, Noma Security’s $100 million Series B will fuel development of risk management and runtime protection features. CEO Niv Braun said demand for securing agentic AI has surged among Fortune 500 firms and healthcare and financial institutions. First seen…
-
KnowBe4 stellt Keith Bird als Executive Vice President of International Growth ein
Die weltweit renommierte Cybersicherheitsplattform KnowBe4, die sich umfassend mit Human-Risk-Management befasst, gibt bekannt, dass sie den erfahrenen Manager Keith Bird als Executive Vice President für den weltweiten Vertrieb eingestellt hat. Er wird für das internationale Geschäft in Europa, dem Nahen Osten, Afrika, dem asiatisch-pazifischen Raum, Japan und Lateinamerika verantwortlich sein. Bird ist ein 40-jähriger Tech-Veteran…
-
Mind the overconfidence gap: CISOs and staff don’t see eye to eye on security posture
Tags: ai, attack, awareness, business, ciso, compliance, control, cyber, cybersecurity, data, defense, detection, grc, group, hacker, identity, incident response, intelligence, international, least-privilege, metric, network, phishing, ransomware, risk, risk-assessment, risk-management, soc, strategy, technology, threat, tool, training, updateMisplaced priorities: Investments often favor visibility and compliance over “core capabilities like detection engineering, incident response, and threat containment,” according to Santiago Pontiroli, lead security researcher at cybersecurity vendor Acronis TRU.Delayed adaptation: AI-driven threats demand faster, smarter defenses, but key upgrades (such as behavior-based analytics or automation) are often postponed due to underestimated risk, according…
-
KI im Spannungsfeld zwischen Fortschritt und Risiko
Wir stehen an einem kritischen Punkt: Unternehmen müssen neue Wege im Risikomanagement einschlagen, um mit der Geschwindigkeit und Raffinesse generativer KI Schritt zu halten. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/ki-im-spannungsfeld-zwischen-fortschritt-und-risiko/a41499/
-
Vanta Secures $150M at $4.15B Valuation to Advance AI Trust
Series D Raise Targets Security Automation, Trust Centers and Zero-Touch Reviews. With $150 million in new Series D funding at a $4.15 billion valuation, Vanta plans to accelerate its AI-powered trust platform across new markets including government compliance. The company’s tools automate evidence collection, risk management and policy enforcement in real time. First seen on…
-
Dell demonstration platform breached by World Leaks extortion group
Tags: access, attack, breach, data, data-breach, defense, encryption, exploit, extortion, finance, group, insurance, international, leak, network, ransomware, risk, risk-management, strategy, threat, toolLimited impact but strategic implications: Dell emphasized that the breached platform is architecturally separated from customer-facing networks and internal production systems. “Data used in the solution center is primarily synthetic (fake) data, publicly available datasets used solely for product demonstration purposes or Dell scripts, systems data, non-sensitive information, and testing outputs,” the report added, quoting…
-
New Report Reveals Just 10% of Employees Drive 73% of Cyber Risk
Tags: access, ai, attack, awareness, ceo, compliance, cyber, cybersecurity, data, finance, government, identity, office, phishing, resilience, risk, risk-management, strategy, technology, threat, trainingHuman risk is concentrated, not widespread: Just 10% of employees are responsible for nearly three-quarters (73%) of all risky behavior.Visibility is alarmingly low: Organizations relying solely on security awareness training (SAT) have visibility into only 12% of risky behavior, compared to 5X that for mature HRM programs.Risk is often misidentified: Contrary to popular belief, remote…
-
New Report Reveals Just 10% Of Employees Drive 73% Of Cyber Risk
Austin, United States / TX, July 21st, 2025, CyberNewsWire Living Security, the global leader in Human Risk Management (HRM), today released the 2025 State of Human Cyber Risk Report, an independent study conducted by leading research firm Cyentia Institute. The report provides an unprecedented look at behavioral risk inside organizations and reveals how strategic HRM programs can reduce…
-
NIS2-Umsetzungsgesetz: Geschäftsleitung haftet mit Privatvermögen
Tags: bsi, cloud, computing, cyersecurity, dns, dora, germany, governance, kritis, monitoring, nis-2, risk, risk-management, vulnerabilityNIS2-Versäumnisse können teuer werden nicht nur furs Unternehmen, sondern auch für die Geschäftsleitung persönlich.Angesichts der sich stets verschärfenden Cyberbedrohungslage (nicht nur in Deutschland) hat sich der europäische Gesetzgeber in den letzten Jahren intensiv mit dem Thema IT-Sicherheit befasst. Im Januar 2023 traten gleich drei Gesetze in diesem Zusammenhang in Kraft:die NIS2-Richtlinie,die CER-Richtlinie, sowieDORA.Während DORA als Verordnung…
-
(g+) Risikomanagement: KI-Tools und Datenschutz – wie passt das zusammen?
Der KI-Boom stellt die Privatsphäre und damit den Datenschutz vor neue Herausforderungen. First seen on golem.de Jump to article: www.golem.de/news/risikomanagement-ki-tools-und-datenschutz-wie-passt-das-zusammen-2507-197325.html
-
Qualys Studie zeigt: Unternehmen investieren mehr – doch der geschäftliche Blick fehlt
Wer Cybersicherheit heute wirklich wirksam gestalten will, muss umdenken: Weg vom reinen Technikfokus, hin zu einem Risikomanagement, das das Geschäft in den Mittelpunkt stellt. Das ROC-Modell liefert hierfür einen strukturierten, unternehmensweiten Ansatz. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/qualys-studie-zeigt-unternehmen-investieren-mehr-doch-der-geschaeftliche-blick-fehlt/a41428/
-
Cyberrisiken 2025 Mehr Investitionen, aber fehlender Geschäftskontext bremst Risikomanagement
Eine aktuelle Studie von Qualys in Zusammenarbeit mit Dark Reading zeigt: Trotz wachsender Ausgaben und zunehmender Relevanz in Vorstandsetagen bleibt das Cyber-Risikomanagement vieler Unternehmen unausgereift. Der Grund: Der geschäftliche Kontext fehlt. Zentrale Erkenntnisse der Umfrage unter über 100 IT- und Security-Verantwortlichen: Cyberrisiken nehmen zu: 71″¯Prozent der Befragten sehen steigende oder gleichbleibende Risiken trotz steigender […]…
-
How AI is changing the GRC strategy
Tags: access, ai, best-practice, breach, business, ciso, compliance, control, data, detection, finance, framework, fraud, governance, grc, guide, law, monitoring, network, nist, privacy, regulation, risk, risk-analysis, risk-management, strategy, threat, toolAdapting existing frameworks with AI risk controls: AI risks include data safety, misuse of AI tools, privacy considerations, shadow AI, bias and ethical considerations, hallucinations and validating results, legal and reputational issues, and model governance to name a few.AI-related risks should be established as a distinct category within the organization’s risk portfolio by integrating into…
-
Risk management, legacy tech pose major threats to healthcare firms, report finds
Companies have improved their recovery processes and user controls but still lag in risk preparedness, according to the report. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/healthcare-cybersecurity-risks-report-fortified/753077/
-
Trump seeks unprecedented $1.23 billion cut to federal cyber budget
Tags: attack, cisa, cyber, cybersecurity, data, government, infrastructure, jobs, network, nist, office, risk, risk-management, service, strategy, technology, threatCynthia Brumfield / CSO(The chart is based on White House data provided for 2017, 2018, 2019, 2020, 2021, 2022, and 2023. Numbers for 2024, 2025, and 2026 reflect adjustments that Trump’s OMB made for 2024 and 2025.)The administration’s cybersecurity budget cuts are not evenly distributed among federal agencies. In fact, according to crosscut tables released…
-
Editors’ Panel: Pro-Iran Hackers Threaten to Leak Trump Data
Also: Medicare Data Breach; Gartner Security & Risk Management Summit Takeaways. In this week’s update, ISMG editors discussed Iran-linked hackers claiming to steal emails from Trump’s inner circle, how to refine application development in the age of AI, and a U.S. Medicare data breach amplifying concerns over the safety, security and privacy of federal health…
-
Cybersecurity in the supply chain: strategies for managing fourth-party risks
Tags: access, breach, business, ciso, compliance, control, cyber, cybersecurity, data, exploit, framework, governance, intelligence, ISO-27001, law, mitigation, monitoring, nist, risk, risk-management, saas, service, soc, software, strategy, supply-chain, threat, tool, vulnerabilitySet clear data boundaries: The reality is that any organization consuming third-party software-as-a-service offerings and services has extremely limited control over the partners that their third parties are working with, says Curtis Simpson, CISO at Armis.”This is why it’s critically important to understand the sub-processors involved in the delivery of contracted SaaS offerings and services,…
-
KnowBe4 stellt neues Assessment-Tool zur Bewertung der Sicherheitskultur vor
Hier setzt das PMA an: Entwickelt von Perry Carpenter, einem führenden Experten für Sicherheitskultur, bietet das Tool einen klar strukturierten, praxisnahen Rahmen zur Selbsteinschätzung. Im Fokus stehen nicht technische Systeme, sondern die menschlichen und organisatorischen Faktoren, die für wirksames Human Risk Management entscheidend sind. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/knowbe4-stellt-neues-assessment-tool-zur-bewertung-der-sicherheitskultur-vor/a41280/
-
Federal Reserve System CISO on aligning cyber risk management with transparency, trust
In this Help Net Security interview, Tammy Hornsby-Fink, CISO at Federal Reserve System, shares how the Fed approaches cyber risk with a scenario-based, intelligence-driven … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/07/01/tammy-hornsby-fink-federal-reserve-system-cyber-risk/
-
LLMs hype versus reality: What CISOs should focus on
Tags: ai, attack, backdoor, breach, business, chatgpt, ciso, cloud, control, corporate, cyber, cybercrime, cybersecurity, data, finance, governance, LLM, malware, monitoring, network, open-source, risk, risk-management, sans, service, software, supply-chain, technology, threat, tool, vulnerabilitynot using AI even though there is a lot of over-hype and promise about its capability. That said, organizations that don’t use AI will get left behind. The risk of using AI is where all the FUD is.”In terms of applying controls, rinse, wash, and repeat the processes you followed when adopting cloud, BYOD, and…

