This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
The Third-Party Vendor Risk Management in Healthcare report from the Cloud Security Alliance (CSA) provides an overview of the third-party vendor security risks healthcare organizations face.
The global average cost of a data breach has reached an all-time high of $4.35 million, according to IBM Security's annual Cost of a Data Breach Report.
The risk assessment process shouldn't be dreaded. Get ready to breathe easier with six steps to move toward a smoother risk assessment process and much tighter security.
Rob Thompson has been named as Wayne State University’s Chief Information Officer (CIO) and Associate Vice President for Computing and Information Technology (C&IT).
In the latest The Security Podcasts episode, Tom Thimot, CEO of authID.ai, offers a unique perspective on the concerns raised around ID.me’s technology, where they went wrong with the IRS, and the drawbacks of facial recognition technology.
The Q2 2022 Brand Phishing Report from Check Point Research (CPR) found that LinkedIn is the most-impersonated brand when it comes to phishing campaigns.
While businesses have taken risk management into the digital age, morphing governance, risk and compliance into digital risk management (DRM), many organizations missed one vital component of DRM —
namely, compliance as a code.