The return on security investment is a crucial calculation to help CISOs demonstrate risks in business terms and gain executive buy-in for security tools.
The IBM Security X-Force team offered some security predictions for new trends in the technology landscape and threats that are poised to emerge in 2018.
Operational risk management can help organizations measure the cost of network security solutions versus the cost of a potential data breach.
The new COSO enterprise risk management framework offers business leaders a road map to more effectively assess, manage, review and report on cyber risks.
The threat landscape is expanding, and organizations must undergo a cognitive convergence to manage evolving security, fraud and operational risks.
A secure digital transformation requires open lines of communication and collaboration between line of business executives and security leaders.
Thanks to their harrowing experience with the Evil Witch, Hansel and Gretel went on to become expert threat hunters to protect the children of the forest.
Physical theft accounted for two-thirds of inventory shrinkage in 2016, suggesting that retailers need to improve their loss prevention strategies.
Consumers traveling during the holiday season should be aware of RFID attacks that could enable thieves to control their hotel key cards and digital locks.
On November 22, Intel Corporation confirmed security vulnerabilities relating to Intel Management Engine (ME), Intel Server Platform Service (SPS),...