risk management
Recommendations for managing AI risks
Recommendations for managing AI risks
Integrate your external AI tool findings into your broader security programs
25 Apr 2022
How a platform approach to security monitoring initiatives adds value
How a platform approach to security monitoring initiatives adds value
Integration, orchestration, analytics, automation, and the need for speed
1 Apr 2022
Improve security and compliance
Improve security and compliance
Adopting an effective security and compliance risk management approach
8 Mar 2022
Modern governance: The how-to guide
Modern governance: The how-to guide
Equipping organisations with the right tools for business resilience
8 Dec 2021
Marsh McLennan reveals its cyber risk analytics center

Marsh McLennan reveals its cyber risk analytics center
The center combines the expertise of Marsh, Guy Carpenter, Mercer, and Oliver Wyman
15 Oct 2021
Six ways boards can step up support for cyber security

Six ways boards can step up support for cyber security
Security is an enterprise-wide risk management concern, not merely an IT issue
22 Jul 2021
How to increase cyber resilience within your organisation
How to increase cyber resilience within your organisation
Cyber resilience for dummies
15 Jul 2021
Digital transformation and addressing risk

Digital transformation and addressing risk
How has your organisation’s risk profile changed in recent years due to its digital transformation?
24 Mar 2021
Observability in 2020: A manifesto
Observability in 2020: A manifesto
Ten principles for observability success
24 Nov 2020
Leadership compass: Privileged Access Management
Leadership compass: Privileged Access Management
Securing privileged accounts in a high-risk environment
24 Nov 2020
Bigleaf Networks’ AI-powered feature translates network events into actionable risks

Bigleaf Networks’ AI-powered feature translates network events into actionable risks
AI-widget identifies risks triggered by a site and highlights only the top three with actionable solutions
9 Oct 2020
Digital Risk Report 2020
Digital Risk Report 2020
A global view into the impact of digital transformation on risk and security management
14 Feb 2020
Your guide to managing cloud transformation risk
Your guide to managing cloud transformation risk
Realise the benefits. Mitigate the risks
11 Feb 2020
Micro Focus suffers shares slump amid revenue fears

Micro Focus suffers shares slump amid revenue fears
CEO Chris Hsu leaves as analyst points finger at HPE merger difficulties
19 Mar 2018
Apple and Cisco tempt businesses with cybersecurity discount

Apple and Cisco tempt businesses with cybersecurity discount
Kaspersky claims it sets a "worrying precedent" of insurance companies claiming to be better informed on security
6 Feb 2018
LinkedIn cannot block third-parties from data access

LinkedIn cannot block third-parties from data access
The ruling may have implications for social media users wishing to control how their data is collected
15 Aug 2017
Read Google's five rules for human-friendly AI

Read Google's five rules for human-friendly AI
Google updates Asimov's Three Laws of Robotics for AI developers
22 Jun 2016
Microsoft targets .NET Core with new bug bounty rewards

Microsoft targets .NET Core with new bug bounty rewards
Redmond offers more cash prizes for sourcing errors in its upcoming web frameworks
8 Jun 2016
Man who 'deleted company with one line of code' admits hoax

Man who 'deleted company with one line of code' admits hoax
Marco Masala admits the story was a viral marketing ploy
18 Apr 2016
Uber launches bug bounty programme with $10k prize

Uber launches bug bounty programme with $10k prize
Keen bug tracers will need to find five genuine bugs to receive their first payout
23 Mar 2016
‘Worst passwords’ list 2015 topped by 123456

‘Worst passwords’ list 2015 topped by 123456
Annual list of most commonly used passwords included Star Wars-related terms
20 Jan 2016
Lumension takes the wraps off LEMSS 7.3

Lumension takes the wraps off LEMSS 7.3
LEMSS 7.3 promises to protect against more pernicious attacks, such as RMI, says vendor.
25 Apr 2013
Cryptzone CEO gives his account of the events that led to

Cryptzone CEO gives his account of the events that led to
Security vendor's CEO denies challenges around acquisitions were factor in NETconsent's retreat.
7 Dec 2012