Tag: risk
-
Undocumented Radios Found in Solar-Powered Devices
The US Transportation Department reportedly warns that solar-powered devices used in highway infrastructure have undocumented radios. Is the risk real? First seen on darkreading.com Jump to article: www.darkreading.com/ics-ot-security/undocumented-radios-found-solar-powered-devices
-
Black Box Testing vs. White Box: The Hidden Risks of Choosing Wrong
With attacks on applications growing rapidly, regular testing of web and mobile platforms has become critical. In fact, statistics show that web applications are involved in 26% of breaches, ranking as the second most exploited attack pattern. There are multiple testing types, like black box testing, white box, gray box, etc., that can help organizations……
-
So rechtfertigen Sie Ihre Security-Investitionen
Tags: ai, ciso, cloud, compliance, cyberattack, cybersecurity, cyersecurity, Hardware, infrastructure, resilience, risk, saas, service, strategy, tool, vulnerability, zero-trustLesen Sie, welche Aspekte entscheidend sind, um die Investitionen in die Cybersicherheit im Unternehmen zu rechtfertigen.In modernen Unternehmensumgebungen werden Investitionen in Sicherheitstechnologien nicht mehr nur anhand ihres technischen Reifegrades beurteilt. Die Finanzierung hängt vermehrt davon ab, inwieweit sich damit Umsatz generieren lässt, Risiken gemindert und Mehrwerte für Aktionäre geschaffen werden. Von CISOs wird erwartet, dass…
-
Fünf KI-Use-Cases für CISOs
Tags: access, ai, business, ceo, cio, ciso, cybercrime, cybersecurity, cyersecurity, data, framework, google, incident response, mail, microsoft, phishing, rat, risk, risk-management, service, siem, soc, tool, vpn, vulnerability, vulnerability-management -
Ransomware, vendor outages, and AI attacks are hitting harder in 2025
Ransomware, third-party disruptions, and the rise of AI-powered attacks are reshaping the cyber risk landscape in 2025. A new midyear analysis from Resilience shows how these … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/09/12/resilience-2025-cyber-risk-trends/
-
So rechtfertigen Sie Ihre Security-Investitionen
Tags: ai, ciso, cloud, compliance, cyberattack, cybersecurity, cyersecurity, Hardware, infrastructure, resilience, risk, saas, service, strategy, tool, vulnerability, zero-trustLesen Sie, welche Aspekte entscheidend sind, um die Investitionen in die Cybersicherheit im Unternehmen zu rechtfertigen.In modernen Unternehmensumgebungen werden Investitionen in Sicherheitstechnologien nicht mehr nur anhand ihres technischen Reifegrades beurteilt. Die Finanzierung hängt vermehrt davon ab, inwieweit sich damit Umsatz generieren lässt, Risiken gemindert und Mehrwerte für Aktionäre geschaffen werden. Von CISOs wird erwartet, dass…
-
Fünf KI-Use-Cases für CISOs
Tags: access, ai, business, ceo, cio, ciso, cybercrime, cybersecurity, cyersecurity, data, framework, google, incident response, mail, microsoft, phishing, rat, risk, risk-management, service, siem, soc, tool, vpn, vulnerability, vulnerability-management -
New infosec products of the week: September 12, 2025
Here’s a look at the most interesting products from the past week, featuring releases from Cynomi, DataLocker, Gigamon, Lookout, and Relyance AI. Cynomi simplifies vendor risk … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/09/12/new-infosec-products-of-the-week-september-12-2025/
-
Human Risk Management: KnowBe4-Whitepaper verfolgt ganzheitlichen Ansatz
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/human-risk-management-knowbe4-whitepaper-ganzheitlicher-ansatz
-
The Future of Human Risk Management: The Zensory and Brigantia Partnership A Year On
Cybersecurity distributor Brigantia and The Zensory, the popular wellbeing and productivity platform dedicated to transforming work habits, have been working together for a whole year now. The partnership set out with a hefty aim: to tackle one of the biggest threats in cybersecurity human error. No small feat. Reporting on the success of the The…
-
Vanta introduces Vanta AI Agent for risk management
Vanta, the trust management platform, has announced a new set of capabilities that embed AI across core compliance and risk workflows. The expanded capabilities unify policy management with Vanta AI Agent, continuous monitoring for vendors, risk oversight, and deeper integrations, providing security leaders with a single system of record to act on risk before it…
-
AI Security Risks Mirror Past Application Flaws
GitLab’s Joern Schneeweisz on Prompt Injections and Old AppSec Issues. Large language models pose systemic risks, and the rush to release AI products revives old security flaws. Prompt injections and familiar application vulnerabilities expose gaps created when speed outweighs safety, said Joern Schneeweisz, principal security engineer at GitLab. First seen on govinfosecurity.com Jump to article:…
-
Closing OT Blind Spots With Asset Visibility, Culture
Merck’s Luis Contasti Aguirre on Building Resilient OT Security Programs. Luis Contasti Aguirre from Merck shares how visibility into OT assets, clear processes and a strong risk-aware culture help secure critical systems. He explains how aligning people, process and technology strengthens compliance, reduces false positives and ensures operational resilience. First seen on govinfosecurity.com Jump to…
-
CodeCloud Visibility: Why Fragmented Security Can’t Scale
Tags: ai, api, best-practice, business, ciso, cloud, container, data, flaw, identity, infrastructure, kubernetes, risk, risk-management, service, strategy, threat, tool, vulnerability, vulnerability-managementWidespread visibility is critical for cloud security, but obtaining it is easier said than done. To discover insights and best practices for code-to-cloud visibility, check out highlights from a new IDC white paper. Plus, learn how Tenable’s CNAPP and exposure management platform give you an unimpeded view of your multi-cloud and hybrid environment. The modern…
-
The Buyer’s Guide to Browser Extension Management
Browser extensions boost productivity”, but also open the door to hidden risks like data exfiltration and AitM attacks. Keep Aware’s Buyer’s Guide shows how to gain visibility, enforce policies, and block risky add-ons in real time. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/the-buyers-guide-to-browser-extension-management/
-
How Exposure Management and Cyber Risk Quantification Power CTEM
If you’ve been anywhere near cybersecurity leadership circles lately, you’ve probably heard the acronym CTEM tossed around a lot. Continuous Threat Exposure Management promises a framework for staying ahead of an endlessly shifting attack surface. But here’s the catch: a framework is only as good as the engines that drive it. That was the heart……
-
Anthropic’s Claude AI Weaponized in $500K Cybercrime Spree
An unprecedented breach turned Claude into a cybercriminal, highlighting the risks of autonomous AI. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/news/anthropics-claude-ai-weaponized-in-500k-cybercrime-spree/
-
Microsoft’s September Security Update High-Risk Vulnerability Notice for Multiple Products
Overview On September 10, NSFOCUS CERT detected that Microsoft released the September Security Update patch, fixing 86 security issues involving widely used products such as Windows, Microsoft Office, Azure, and Microsoft SQL Server, including high-risk vulnerability types such as privilege escalation and remote code execution. Among the vulnerabilities fixed by Microsoft’s monthly update this month,…The…
-
Chatbots, APIs und die verborgenen Risiken in modernen Application-Stacks
Was passiert, wenn eine Legacy-Anwendung unbemerkt bleibt und plötzlich im Zentrum eines Sicherheitsvorfalls mit KI und APIs steht? Für ein globales Unternehmen wurde dieses Szenario Realität, als ein Recruiting-Chatbot ungewöhnliches Verhalten zeigte und damit den Blick auf eine unterschätzte Plattform lenkte. Die anschließende Untersuchung brachte eine ganze Reihe von Risiken ans Licht. Der Fall zeigt,…
-
Qualys zeigt die verborgenen Risiken in modernen Application Stacks auf
Tags: riskRisiken machen sich selten sofort bemerkbar, sondern entwickeln ihre Wirkung oft im Verborgenen. Sie schleichen sich in den Alltag ein und werden erst sichtbar, wenn sie Schlagzeilen machen. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/qualys-zeigt-die-verborgenen-risiken-in-modernen-application-stacks-auf/a41982/
-
Shift from Reactive to Proactive: Leveraging Tenable Exposure Management for MSSP Success
Tags: access, ai, api, application-security, attack, best-practice, breach, business, cloud, compliance, control, cyber, cybersecurity, data, endpoint, exploit, framework, guide, identity, infrastructure, iot, mitre, mssp, risk, risk-management, service, technology, threat, tool, vulnerability, vulnerability-managementAn Exposure Management as a Service offering allows MSSPs to unify security visibility, insight and action across the attack surface to prioritize exposure and enable innovation that is secure and compliant. Whether you’re already leveraging Tenable Vulnerability Management as a Service or you’re just starting a service offering, we’ve got guidance for you. Key takeaways…
-
How attackers weaponize communications networks
In this Help Net Security interview, Gregory Richardson, Vice President, Advisory CISO Worldwide, at BlackBerry, talks about the growing risks to communications networks. He … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/09/11/gregory-richardson-blackberry-securing-communication-networks/
-
How attackers weaponize communications networks
In this Help Net Security interview, Gregory Richardson, Vice President, Advisory CISO Worldwide, at BlackBerry, talks about the growing risks to communications networks. He … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/09/11/gregory-richardson-blackberry-securing-communication-networks/
-
Imperva API Security: Authentication Risk Report”, Key Findings Fixes
An in-depth analysis of common JSON Web Token (JWT) mistakes, basic auth, long-lived tokens, and quick, high-impact fixes to secure your APIs. Introduction APIs are the backbone of modern digital services”, from mobile apps and e-commerce to banking and IoT. That scale and utility also make them prime targets. In our recent study of authentication-related…
-
Managed SOC für mehr Sicherheit
Tags: awareness, cloud, compliance, cyberattack, encryption, germany, infrastructure, nis-2, password, risk, security-incident, service, soc, software, supply-chainAls zentrale Einheit überwachen Fachleute im SOC die gesamte IT-Infrastruktur eines Unternehmens. Rund um die Uhr analysieren sie alle sicherheitsrelevanten Ereignisse in Echtzeit.Die Anforderungen an IT-Sicherheit haben sich in den vergangenen Jahrzehnten drastisch verändert. Während früher ein einfaches Passwort als Schutzmaßnahme genügte, sind heute mehrschichtige Sicherheitskonzepte erforderlich. Nur so können sich Unternehmen effektiv vor Cyberangriffen…
-
Why organizations need a new approach to risk management
To succeed in the risk environment, risk, audit, and compliance leaders need to focus on what Gartner calls “reflexive risk ownership.” This is a future state where business … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/09/11/gartner-organizational-risk-management-strategy/
-
When is the Right Time to Hire a CISO?
Knowing when to hire a CISO is a challenging proposition one which most organizations will eventually need to answer. The need to hire a CISO depends on a combination of factors, including but not limited to: Relevance of regulatory requirements Size of the organization Complexity of operations Sensitivity of data handled or processed Desired risk…

