Tag "Risk Mitigation"

Back to homepage
Hardware/Network

How to Mitigate the Threat Within

Depending on the study you consult, 74 percent to 90 percent of organizations believe they are vulnerable to insider threats. The truth is, the number should be 100 percent as

Software

Artificial Intelligence Risks Call For Fresh Approaches, Expanded Collaboration

New technologies inevitably introduce new risks for security professionals to mitigate. While this is often challenging, practitioners generally have been able to adjust to the evolving threat landscape, drawing upon

IT Compliance

Time Is Up: Five Ways To Mitigate Risk From GDPR

In May 2018, the European Union General Data Protection Regulation (EU GDPR) went into effect. With the deadline now behind us, there is confusion and ambiguity with respect to definitions,

Software

Four Ways to Mitigate Cyber Risks for ERP Applications

Security Teams Can Shift the Risk/Reward Ratio and Make ERP Applications Less Attractive Targets. A confluence of factors is putting hundreds of thousands of implementations of Enterprise Resource Planning (ERP)

Industry Insights

The Need for Effective Third-Party Risk Management in Financial Services

In the last few years we have seen the frequency and severity of third-party cyberattacks against global financial institutions continue to increase. One of the biggest reported attacks against financial

Industry Insights

How ‘Projection’ Slows Down the Path to Security Maturity

A little bit of self-awareness goes a long way when it comes to evaluating a company’s security maturity level. It’s also a prerequisite to improving. Recently, I observed a somewhat

Cloud

Why the Cloud is Key to Mitigating the Menace of Phishing

After the rise of ransomware over the last few years (largely combatted through better detection of the malware and more attention paid to having decent backups), phishing has stormed back

Industry Insights

Want to Keep Your Data Safe? Secure Your Organization’s Privileged User Accounts

These days, when it comes to stealing your data, cyber-criminals aren’t worried about bypassing your perimeter security and firewalls because they’ve found another way in, using rather simple tactics. Click

Hardware/Network

Why good security foundations are better than the best security mitigation

Since founding VDOO, we have been working to analyze a great many IoT devices, in the broadest way possible. The more we look into these devices and find their vulnerabilities,

Mobile

Mitigating Digital Risk from the Android PC in Your Pocket

Security Teams Must Prioritize Risk Mitigation Against Android MalwareFew of us could have imagined that a device that allows us to talk to anyone from anywhere at any time would