The role of the CISO is rapidly garnering a strategic voice at many organizations.
The latest version of the payment security industry's data safeguarding standard should also include mandates and guidance around risk management, penetration testing and mobile.
Services abound for business continuity and disaster recovery in the cloud, but what's the right choice for your firm? Alan Earls investigates.
IT trends - cloud, social networking and BYOD - are making the practice of security management complex, and are forcing organizations to shift to a risk-management perspective.
Video game players are used to fending off alien invaders, but the IT staff at Electronic Arts (EA) was challenged to reduce cyber risk within its own environment.
What is still missing in IT security is an understanding of how presently installed solutions might already be addressing risks.
With breaches grabbing headlines and cash funneling toward infosec budgets, the role of the security executive is shifting from tech and compliance wonk to savvy businessperson.
Yahoo presumably took no measures to ensure sensitive stuff like customer account credentials were kept safe and sound.
Security metrics remain elusive for many organizations, but key performance indicators, or KPIs, are achievable measurements that can help guide business planning and strategy.
An international confederation of security groups is calling for more cooperation, openness and transparency in government implementations of cyber security.
Risk is a multilayered function derived from threat, vulnerability and impact.
Risks exist in the e-discovery process, as sensitive information frequently moves and is stored outside a company's firewall.
Boardrooms are finally buzzing with serious discussion around cyber security as countless high-profile breaches have produced massive loss.
At a recent SC Magazine Roundtable, gov't security pros bemoaned the difficulty in obtaining resources. But instead of crying over spilled milk, they traded ideas for mitigating risk in a down economy.
Most businesses don't understand how to manage risk, yet, we live in a world full of risks, says Guidance Software's Anthony Di Bello.
John Vigoroux, CEO of security at M86, discusses the challenges facing the IT industry today at this year's RSA Conference 2012.
A panel discussion on risk management hovered around issues of balancing the scientific element of data gathering with the art of interpreting the information.
As targeted attacks scale up and become more sophisticated, expertise in risk management has become one of the most in-demand skill sets a security manager can have, reports Jim Romeo.
Security experts believe that robust risk management programs should be a pillar of business planning, says SC Magazine Editor-in-Chief Illena Armstrong.
The National Institute of Standards and Technology late last week published new guidance to help organizations develop and implement an information security continuous monitoring (ISCM) program. This initiative can help companies better provide ongoing awareness of threats and vulnerabilities, assess the effectiveness of deployed security controls and support risk management decisions, according to the 80-page guidance document. A mature ISCM program, which requires the use of both automated and manual processes, will enable companies to move from compliance-driven to data-driven risk management.
Assessing what level of risk is acceptable to one's business is key to any move to the cloud, says Siobhan Byron, president of Forsythe Technology Canada.
In a conversation with SC Magazine Executive Editor Dan Kaplan, Steve Livingston, principal of Deloitte Enterprise Risk Services, chronicles how people, processes and technology can combine to create a robust risk framework that achieves buy-in from senior management.
Despite an astonishing sequence of breaches this year, expect business executives to remain tight with their purse strings, unless security professionals can accurately convey risk.
Software buyers may soon have access to more secure offerings, thanks to a new scoring system that will allow end-users to demand more assurance.
The ability to ascertain the risk tolerance of the business gives us a benchmark to hit as opposed to just "guessing" and then getting political pushback
The risk environment is becoming more complicated as time goes on and criminals become more and more sophisticated.
IBM on Wednesday announced that it has agreed to acquire Waltham, Mass.-based risk and compliance management software provider OpenPages for an undisclosed sum. In a news release, IBM said the acquisition will expand its ability to help businesses address risk management and compliance challenges. OpenPages, which will be integrated within IBM's Business Analytics software portfolio, offers solutions to assist organizations with internal audits, vendor risk management and IT risk and compliance management. The company has more than 200 clients, including Barclays, Duke Energy and Carnival Corp. — AM
When the stakes are as high as they are today, relative to protecting organizational information and data, having risk and policy management capability is worth a lot, says Peter Stephenson.
An updated U.S. Department of Homeland Security (DHS) plan for protecting critical infrastructure facilities improves regional protection, risk management and resilience, according to federal investigators.
Sign up to our newsletters
SC Magazine Articles
- Long list of devices believed to be affected by NetUSB vulnerability
- Website observed serving 83 executable files, more than 50 percent malware
- Scammers target oil companies with sneaky attack
- TeslaCrypt used to extort over $76K in recent months
- CareFirst BlueCross BlueShield breached, more than one million individuals notified
- Hackers exploit Starbucks auto-reload feature to steal from customers
- Study: Nearly all SAP systems remain unpatched and vulnerable to attacks
- Former Nuclear Regulatory Commission employee arrested for alleged spear phishing campaign
- Millions of WordPress websites vulnerable to XSS bug
- FireEye first cybersecurity firm awarded DHS SAFETY Act certification
- FTC gives thumbs up to companies that cooperate during breach probes
- Researchers publish developer guidance for medical device security
- Senate gears up for Saturday USA Freedom Act vote; House breaks for recess
- Researchers observe SVG files being used to distribute ransomware
- Federal prosecutors charge Chinese nationals with trade secret theft