risk management

Browse by

Clear

risk management

The Role of AI in Cybersecurity

Artificial intelligence (AI) and machine learning (ML) have become fundamental to cybersecurity. Artificial Intelligence has the amazing capacity for use to protect as well as to do harm. In the wrong applications, AI has a tremendous capacity to render security systems useless. Grasping the scope of AI’s capabilities and strengths and how it can help protect information is, therefore, essential for any firm concerned with data security.

risk management

Reducing Risks in Financial Transactions with SWIFT Sanctions Screening

The Society for Worldwide Interbank Financial Telecommunications (SWIFT) offers a messaging service which allows financial institutions around the world to send and receive information and instructions about financial transactions securely.

risk management

Shielding the Organization in the Fight Against Malware

Malware continues to be one of the top factors contributing to network compromise which may eventually lead to data breach. Malware attack has the costliest impact on organizations with an average total cost amounting to$2.4 million .This means close to $7,000 per day or $200,000 per month is incurred by victims across the globe. Moreover, these attacks cause significant damage to an organization’s infrastructure by compromising data, preventing or slowing down the running of computers and resulting in the loss of vital information.

risk management

Minimizing Threats and Vulnerabilities on Mobile Platforms

Mobile devices have enabled improved benefits of computing which have likely resulted in increased efficiencies for the organization and users. However, with the potential benefits come increased challenges in maintaining a stable and secured environment at work. Mobile devices are one of the most vulnerable vectors in an organization. As its ubiquity continues to expand, organizations continue to be challenged in developing suitable security controls to minimize vulnerabilities. These challenges are generally inherent in the device and use patterns. This dilemma has therefore placed increased challenges on the information security team to defend against mobile threats, maintain security standards and minimize risks.

risk management

Managing Vulnerabilities and Risks in the Healthcare Sector

The healthcare industry processes a large volume of sensitive personal data of billions of people worldwide. A security breach therefore has significant financial, personal and organizational consequences. It is therefore hardly surprising that the cost of data breach in healthcare organizations more than double the average cost in other sectors. According to the 2017 Cost of Data Breach Study, healthcare organizations had an average cost of $380 for each lost or stolen record . This is compared to the average global cost of data breach being $141.

risk management

Do Not Be Held Hostage by Ransomware Attacks

In 2016, the FBI warned of the rise of the incidents of ransomware. Since then, these malicious applications have continued to grow in sophistication. Evolving new cyberattack modelsare being developedresultingin attackers being able to launch more sophisticated and profitable attacks on a larger global scale. Consequently, the incidences of these attacks have doubled to 27 percent of cyberincidents over the previous year, 2016 . To put this trend in perspective, there were 638 million ransomware attacks in 2016, per the SonicWall GRID 2017 Threat Network .This means that organizations across multiple countries have been targeted with close to 4 million ransomware attacks per day in 2017.

risk management

Developing Safeguards to Combat the Rise of ATM Malware

ATM is one of the great convenience of this modern financial age. However, ATMs have been plagued with increased attacks as criminals are exploiting hardware and software vulnerabilities to exploit ATMs to obtain large sums of cash.A Trend Micro andEuropol2017 Report[1] highlighted that the use of ATM malware has evolved significantly as the scope and scale of these attacks have grown. This latestdevelopment is attributable to several factors.

risk management

Boosting Your Security Posture with Security Analytics

With the rise of cyberincidents, organizations continue to search for effective tools and strategies to fight against cybercrimes and to build resilience in their environment. Based on the 2017 Trustwave Report[1], cyberincidents were spread across economic sectors and regions during the reporting year. Every single region was affected, with North America and the Asia-Pacific regions accounting for the bulk of reported cases (70%). The retail industry had the single largest share of cyberincidents (22%), followed by the food and beverage (20%), financeand insurance (14%), hospitality (12%). Technology, transport, entertainment, travel and other sectors accounted for the remaining 32%. These revealing statistics emphasize the continued urgent need for organizations to shore up the cybersecurity defenses while proactively engaging in offensive tactics.

risk management

The Real Benefits of Conducting Vulnerability Assessment and Penetration Testing (VAPT)

An organization, regardless of its size, purpose and location is susceptible to cybersecurity threats. This is so, once an organization has data and operates in a networked environment.

risk management

How to Minimize Risks with Open-source Solutions

Many organizations in various industries across the globe have invested in open-source solutions to reduce costs. These solutions are also attractive to commercial vendors since the use of open-source components reduces development costs and improve the time to market. These situations have resulted in approximately 3 in 4 organizations adopting open-source solutions.

Subscription Center

Stay in the Know with Our Newsletter