Bridging the gap between cyber security and enterprise risk management programmes is a key priority for risk professionals, according to Jayant Dave, Check Point’s chief information security officer ...
Most security and risk professionals can’t reliably establish a big-picture view of their cyber risk environment. Fragmented cyber risk data, siloed data streams, technical jargon and inconsistent ...
Your sensitive customer data and intellectual property are under constant threat from cyber attackers. If they successfully manage to download their malware onto your ...
April 14, 2025 - Organizations need to make statements about their cybersecurity and information systems, articulated by different people to different audiences. There are tensions because some parts ...
Traditional cybersecurity measures are increasingly inadequate against sophisticated threats in the rapidly evolving digital security landscape. Artificial intelligence (AI) has emerged as a ...
On a March 2024 National Association of State Chief Information Officers call with both government and corporate IT leaders, an old security problem was highlighted that has evolved into a current top ...
As the stakes of cyberattacks continue to rise, organizations are throwing more and more money at innovative new services and equipment to thwart them. But, at the same time, many are still taking a ...
No more delegating—when it comes to oversight of cyber risk, boards are tackling it head (and hands) on. Here’s how. As chairman of the board for Cinturion Group, Richard Marshall is intimately ...
Cyberattacks have more than doubled since the pandemic. While companies have historically suffered relatively modest direct losses from cyberattacks, some have experienced a much heavier toll. US ...