article thumbnail

Managing technology risk

CyberSecurity Insiders

AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Numerous risks are inherent in the technologies that all organizations use. As GRC is broken down into three components, a discussion of each will illuminate why each is critical for risk management.

article thumbnail

Addressing Top Technology Risks on the Digital Frontier

Security Boulevard

Addressing Top Technology Risks on the Digital FrontierIn the changing terrain of technology, businesses find themselves at the intersection of innovation and risk management. The post Addressing Top Technology Risks on the Digital Frontier appeared first on Security Boulevard.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Where we stand on mitigating software risks associated with fly-by-wire jetliners

The Last Watchdog

Here’s what you should know about the risks, what aviation is doing to address those risks, and how to overcome them. It is difficult to deny that cyberthreats are a risk to planes. Risks delineated Still, there have been many other incidents since. There was another warning from the U.S.

Software 264
article thumbnail

Synopsys takes aim at software supply chain risks

InfoWorld on Security

Synopsys has introduced Black Duck Supply Chain Edition , a software composition analysis (SCA) package that helps organizations mitigate upstream risk in software supply chains, including from AI code. To read this article in full, please click here

article thumbnail

Google launches Secure AI Framework to help secure AI technology

CSO Magazine

Google, owner of the generative AI chatbot Bard and parent company of AI research lab DeepMind, said a framework across the public and private sectors is essential for making sure that responsible actors safeguard the technology that supports AI advancements so that when AI models are implemented, they’re secure-by-default.

article thumbnail

How 5G Technology Accelerates Cybersecurity

CyberSecurity Insiders

The advent of 5G technology brings not only faster speeds and low latency but also significant advancements in enhancing cybersecurity. This article explores the ways in which 5G helps accelerate cybersecurity, safeguarding the increasingly connected world we live in.

article thumbnail

The strong link between cyber threat intelligence and digital risk protection

CSO Magazine

In fact, these changes have led to a CTI subcategory focused on digital risk protection. DRP is broadly defined as, “telemetry, analysis, processes, and technologies used to identify and mitigate risks associated with digital assets.” To read this article in full, please click here I’ve also dug into the CTI lifecycle.