CISO practitioner analyst Chris Hughes emphasizes why today’s CISOs need to prioritize their agenda to quantify risk, embrace zero trust, and fight talent burnout
Search Results: risk management (721)
When a large oil and gas company in southeast Europe set out to migrate on-premises data and applications to public cloud infrastructure, they turned to Lookout to help address the myriad of security challenges that emerged.
Learn about the top 5 cloud services risks, how to mitigate the risks, and how to secure cloud operations with the Lookout Security Platform.
During the Women in Tech session at Community Summit 2022, Cathy Richards-Ingram from Avalara, Jennifer Harris from TMC, and Ann D’Emilio from Vertex shared their experiences and advice as women in the technology field.
Analyst Chrus Hughes takes a look at EPSS, a new approach to evaluating vulnerability that takes into account not only criticality and scores, but also exploitability.
Janet looks at this year’s Verizon Data Breach Investigations Report (DBIR) and singles out a few facts that can help organizations evaluate risk in partnership strategy.
Most companies still struggle with managing credit manually. Keeping track of customers, payment terms, ratings and more in a mix…
Quantifying cyber risk helps board members and other business leaders see the importance of cybersecurity investment. As Chris Hughes explains, the FAIR model offers a framework to do this.
Robert Wood explores several areas of risk that can emerge with the adoption of low-code/no-code applications.
Data loss prevention policies sound good on the surface, but dig deeper and you’ll find that they come with unexpected risks. Analyst Robert Wood explains what these risks are and how to avoid them.
Janet Schijns looks at the impact a partner can have, both positive and negative, on your firm’s data project, and offers tips on vetting and choosing the right ones.
Driving down the IAM environment’s complexity should be a major priority for all organizations, especially given the common problem of attracting and retaining technical talent.
Automated risk management is growing in importance as global finance becomes more interconnected and mobile — and therefore more complex.
When it comes to cyber risk quantification, cybersecurity as an industry has become abysmal. How can organizations overcome these challenges?
Vulnerability management is always a daunting task. In multi-cloud scenario, it’s even more challenging, as Chris Hughes explains in the context of AppSec.
In Episode 44 of the CXO2 Minute, Wayne continues his examination of a CISO’s place within an organization and explains why boards are responsible for understanding all sides of technology.
When managing threats, no organization has the same exact needs. Robert Wood shares four factors to look at to help find solutions that fit, no matter the scenario.
The cloud-native approach will modernize enterprise software architecture — but what are the security implications? Bill Doerrfeld explains.
Using NLP and other artificial intelligence technology, the tech startup helps make disparate elements of supply chains run more smoothly.
The steady pace of software updates have become part of the rhythm of life in the 21st Century. Even on…