article thumbnail

Insider Risk Digest: April

Security Boulevard

This Article Insider Risk Digest: April was first published on Signpost Six. | We also examine the broader implications of economic pressures on insider threats and explore international […] This Article Insider Risk Digest: April was first published on Signpost Six. |

Risk 64
article thumbnail

Insider Risk Digest: February

Security Boulevard

This Article Insider Risk Digest: February was first published on Signpost Six. | | [link] Introduction Our second edition of 2024’s Insider Risk Digest is here. Now a monthly edition, we bring you the key pieces of news and developments in the realm of insider risk.

Risk 64
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Top 7 Cyber Risk Management Trends for 2024 | Kovrr blog

Security Boulevard

Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post The Top 7 Cyber Risk Management Trends for 2024 | Kovrr blog appeared first on Security Boulevard.

article thumbnail

Security Risks of Client-Side Scanning

Schneier on Security

I’m part of a group of cryptographers that has just published a paper discussing the security risks of such a system. (It’s It’s not a cryptographic backdoor, but it’s still a backdoor — and brings with it all the insecurities of a backdoor.

Risk 309
article thumbnail

Insights from CISA HPH Sector Risk and Vulnerability Assessment

Security Boulevard

The United States Cybersecurity and Infrastructure Security Agency (CISA) recently conducted a Risk and Vulnerability Assessment (RVA), delving into the cybersecurity posture of an unnamed HPH organization utilizing on-prem software.

Risk 105
article thumbnail

GUEST ESSAY: Where we stand on mitigating software risks associated with fly-by-wire jetliners

The Last Watchdog

Here’s what you should know about the risks, what aviation is doing to address those risks, and how to overcome them. It is difficult to deny that cyberthreats are a risk to planes. Risks delineated Still, there have been many other incidents since. Fortunately, there are ways to address the risks.

Software 264
article thumbnail

Risks of Evidentiary Software

Schneier on Security

Over at Lawfare, Susan Landau has an excellent essay on the risks posed by software used to collect evidence (a Breathalyzer is probably the most obvious example). Bugs and vulnerabilities can lead to inaccurate evidence, but the proprietary nature of software makes it hard for defendants to examine it.

Software 318