While consolidating third-party risks into one document is important, it is equally vital to introduce artificial intelligence into various elements of your third-party risk management program, said Jonathan Pineda, CISO and DPO at the Government Service Insurance System in the Philippines.
In this episode of CyberEd.io's podcast series "Cybersecurity Insights," Oliver Tavakoli, CTO at Vectra AI, discusses ways that discriminative AI technology can filter out all of the noise from the massive volume of alerts from a portfolio of cybersecurity tools.
Recently acquired RiskLens edged out startup Axio and incumbent ThreatConnect for the top spot in Forrester's first-ever cyber risk quantification rankings. Cyber risk quantification focused on theoretical methodology for about 10 years but shifted to practical applications over the past five years.
In today’s landscape, balancing the potential benefits of increased organizational productivity through generative AI tools with the risks of data leakage has become a significant dilemma for information security officers.
Join us for a webinar on generative AI in cybersecurity, where we will explore the potential...
Welcome to the webinar summarizing the survey: Industry-Specific
Endpoint Security Challenges in Manufacturing - And Strategies to
Alleviate Associated Risks. This survey was conducted in Q1 and 2 of 2023, and attracted 150
responses from senior cybersecurity professionals at
manufacturing operations globally....
What 2023 has in store for us is anyone’s guess—but we’re here to make an educated one.
The rapidly changing threat landscape will drive policy makers to reconsider legislation and guidance—something the Analysts have been predicting, and calling for.
The Analysts will keep pushing organizations towards...
How much does attitude impact behavior — and increase cyber security risk? To answer that question and more, CybSafe and the National Cybersecurity Alliance have partnered to produce the (first of its kind) Oh Behave! The Annual Cybersecurity Attitudes and Behaviors Report 2022.
This annual cybersecurity report...
Bankers identified several cybersecurity concerns in CSI’s 2023 Banking Priorities survey, including data breaches (23%), ransomware (20%) and breach at a third party (15%). The industry survey responses clearly reflect a landscape focused on cybersecurity threats, but institutions should not overlook the...
People click on phishing emails. Phishing emails contain ransomware. As tempting as it may be to decry “people are the weakest link!”, it’s important to remain curious, be empathetic to people, and seek to understand why they fall victim. It’s important not to work against human nature or against your teams,...
A five-year-old flaw in Fortinet SSL VPNs remains one of the world's most widely exploited vulnerabilities. So warn cybersecurity officials across the U.S. and its Five Eyes partners in a joint security advisory highlighting the 12 most exploited flaws that require immediate patching.
According to Expel's Q1 2023 Quarterly Threat Report, criminals are exploiting 1- to 2-year-old vulnerabilities. This suggests organizations don’t know which vulnerabilities pose the biggest threats to their environments, said Andrew Hoyt, Expel's director of solution architecture.
The shifting of information to data warehouses such as Snowflake and Databricks has created oversight challenges around access and ownership, said Immuta CEO Matthew Carroll. Customers should be able to scan and analyze where their cloud data lives and identify and fix flaws or abnormalities.
Today's CISO must have close communication with the C-suite, understand the business needs of the organization as well as its objectives and risks, and to be able to articulately translate those business objectives into technology, said Dion Alexopoulos, head of security at Camelot.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.