On Risk-Based Authentication

Schneier on Security

A Study on Usability and Security Perceptions of Risk-based Authentication “: Abstract : Risk-based Authentication (RBA) is an adaptive security measure to strengthen password-based authentication. I’ve blogged about risk-based authentication before.

AI Security Risk Assessment Tool

Schneier on Security

Uncategorized artificial intelligence automation machine learning risk assessmentMicrosoft researchers just released an open-source automation tool for security testing AI systems: “ Counterfit.” ” Details on their blog.

Risk 275
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

COVID-19 Risks of Flying

Schneier on Security

This is all a prelude to saying that I have been paying a lot of attention to the COVID-related risks of flying. I think that most of the risk is pre-flight, in the airport: crowds at the security checkpoints, gates, and so on. airtravel covid19 riskassessment risksI fly a lot.

Risk 277

The Legal Risks of Security Research

Schneier on Security

Sunoo Park and Kendra Albert have published “ A Researcher’s Guide to Some Legal Risks of Security Research.” Our Guide gives the most comprehensive presentation to date of this landscape of legal risks, with an eye to both legal and technical nuance.

Risk 239

Cover Your SaaS: How to Overcome Security Challenges and Risks For Your Organization

Speaker: Ronald Eddings, Cybersecurity Expert and Podcaster

In this webinar, Ronald Eddings, Cybersecurity Expert, will outline the relationship between SaaS apps and IT & security teams, along with several actionable solutions to overcome the new difficulties facing your organization.

Risks of Evidentiary Software

Schneier on Security

Over at Lawfare, Susan Landau has an excellent essay on the risks posed by software used to collect evidence (a Breathalyzer is probably the most obvious example).

What is Cybersecurity Risk Management?

eSecurity Planet

Risk management is a concept that has been around as long as companies have had assets to protect. This article looks at cybersecurity risk management, how to establish a risk management system, and best practices for building resilience. What is Cybersecurity Risk Management?

Risk 95

Risks of Password Managers

Schneier on Security

Stuart Schechter writes about the security risks of using a password manager. My particular choices about security and risk is to only store passwords on my computer -- not on my phone -- and not to put anything in the cloud. In my way of thinking, that reduces the risks of a password manager considerably. passwordsafe passwords riskassessment risks

Risk Management Programs for the Post-COVID Environment

Security Boulevard

After a year spent managing increased business risks—including security, IT resiliency and cybersecurity concerns—business leaders need to adjust their mindset when it pertains to risk management and avoid the more traditional approach to crisis management and business continuity planning.

Risk 112

Security Risks of Chatbots

Schneier on Security

Good essay on the security risks -- to democratic discourse -- of chatbots. lies nationalsecuritypolicy propaganda risks

Risk 167

How Organizations Can Proactively Manage Privacy Risk

TrustArc

Today’s organizations need to proactively manage privacy risk before a crisis occurs. Don't wait, start thinking about risk management and data protection now. Resources risk assessment Risk Management vendor management

Risk 79

National Security Memo Highlights Quantum Computing Risks

Security Boulevard

The document, released on May 4, warned quantum computing poses “significant risks to the economic and national security of the United States.” The post National Security Memo Highlights Quantum Computing Risks appeared first on Security Boulevard.

Risk 79

Top 10 Considerations in Cybersecurity Risk Management

Security Boulevard

The post Top 10 Considerations in Cybersecurity Risk Management appeared first on PeoplActive. The post Top 10 Considerations in Cybersecurity Risk Management appeared first on Security Boulevard. Security Bloggers Network Cyber Security Cybersecurity Risk Management

Risk 79

Security Risks of Client-Side Scanning

Schneier on Security

I’m part of a group of cryptographers that has just published a paper discussing the security risks of such a system. (It’s Even before Apple made its announcement , law enforcement shifted their battle for backdoors to client-side scanning.

Risk 236

National Security Risks of Late-Stage Capitalism

Schneier on Security

The company outsourced much of its software engineering to cheaper programmers overseas, even though that typically increases the risk of security vulnerabilities. In other words, the risk of a cyberattack can be transferred to the customers.

Risk 276

Perceptions of Insider Risk 2021

Security Boulevard

Insider Risk Summit This week at the Insider Risk Summit, industry experts shared their thoughts on how to mitigate insider risks with discussions about. The post Perceptions of Insider Risk 2021 appeared first on Security Boulevard.

Risk 100

Measuring Security Risk vs. Success

Security Boulevard

Oftentimes, how organizations measure risk determines how they will prioritize investments. The post Measuring Security Risk vs. Success appeared first on Security Boulevard.

Risk 107

Risks in Telecommunications IT

Trend Micro

Malware Phishing Connected Car Compliance & Risks Ransomware Smart Factories Articles, News, Reports Cyber Crime Research Privacy & Risks Cyber Threats IoT Mobile

WEF Report: Cyber Risks Pose Global Threats

Security Boulevard

The World Economic Forum’s (WEF) Global Risks Report 2022 outlined what they believe are the greatest worldwide threats and risks to economic development. The post WEF Report: Cyber Risks Pose Global Threats appeared first on Security Boulevard.

How Much is Enough? A Different Cybersecurity Risk Management Approach

Security Boulevard

A Different Cybersecurity Risk Management Approach appeared first on LogRhythm. A Different Cybersecurity Risk Management Approach appeared first on Security Boulevard. Historically, the fear of cyberthreats put organizations and their IT departments on the defense.

Risk 87

The NSA on the Risks of Exposing Location Data

Schneier on Security

The NSA has issued an advisory on the risks of location data. Mitigations reduce, but do not eliminate, location tracking risks in mobile devices. Users should be aware of these risks and take action based on their specific situation and risk tolerance.

Risk 214

What Are You NOT Detecting?

Anton on Security

What I mean here is: are you thinking about these: Threats that you don’t need to detect due to your risk profile, your threat assessment, etc. However, we all know infosec/cyber/IT is awesome at intelligently assessing risk … right? What are you not detecting? OK, what threats are you NOT detecting? Still didn’t help? Threats that you do need to detect, but don’t know how. Threats that you do need to detect and know how, but cannot operationally (e.g.

Risk 115

What is Third-Party Risk?

Security Boulevard

As if managing your own risk profile isn’t challenging enough today, your organization must concern itself with how. The post What is Third-Party Risk? The post What is Third-Party Risk?

Risk 86

Developing a Risk Management Approach to Cybersecurity

Security Boulevard

The post Developing a Risk Management Approach to Cybersecurity appeared first on Hyperproof. The post Developing a Risk Management Approach to Cybersecurity appeared first on Security Boulevard.

Risk 108

Synthetic Data Removes Data Privacy Risks

Security Boulevard

The post Synthetic Data Removes Data Privacy Risks appeared first on Security Boulevard. Cybersecurity Data Security Governance, Risk & Compliance Security Boulevard (Original) Vulnerabilities Data Privacy data risk synthetic data

Best Risk Management Software for 2021

eSecurity Planet

Enterprise risk management software can provide risk monitoring, identification, analysis, assessment, and mitigation, all in one solution. . Jump to: Top Risk Management Software Vendors What is Risk Management? Top Risk Management Software Vendors.

Risk 72

Why Insider Threat Risk Increases in the Cloud 

Security Boulevard

While these services bring new efficiencies and, in some cases, improved platform security, they also bring new risks – and enterprise security teams need to know what goes on behind the curtain. The post Why Insider Threat Risk Increases in the Cloud appeared first on Security Boulevard.

Risk 103

How To Effectively Use Risk Scoring

Security Boulevard

Arkose Labs is proud to introduce an enhanced version of its risk score algorithm taking into account newly added detection methods, simplifying the maintenance of the product, and opening up a path for self-serviceability. Security Bloggers Network risk scoring

Risk 90

Trend Micro Unfurls Risk Intel Aggregator

Security Boulevard

today launched a cloud-based platform through which it will unify risk and threat assessments using data collected from both its own and third-party security offerings. The post Trend Micro Unfurls Risk Intel Aggregator appeared first on Security Boulevard. Trend Micro Inc.

Risk 67

What Constitutes a Mature Risk Management Program?

Security Boulevard

Risk management programs require a specific approach in order to be truly effective. The post What Constitutes a Mature Risk Management Program? The post What Constitutes a Mature Risk Management Program?

Risk 87

Effective software security activities for managing supply chain risks

Security Boulevard

Get recommendations for managing supply chain risks. The post Effective software security activities for managing supply chain risks appeared first on Software Integrity Blog. BSIMM12 reports increased attention on software security due to recent supply chain disruptions.

Data Laundering Poses Privacy, Security Risks

Security Boulevard

The post Data Laundering Poses Privacy, Security Risks appeared first on Security Boulevard.

Risk 114

Cyberwarfare Risks Continue as Ukraine Crisis Escalates 

Security Boulevard

The post Cyberwarfare Risks Continue as Ukraine Crisis Escalates appeared first on Security Boulevard.

Risk 83

Minimizing security risks: Best practices for success

Tech Republic Security

To reduce security threats within your organization, you must prioritize security risk management. The post Minimizing security risks: Best practices for success appeared first on TechRepublic.

Risk 152

Demystify the Cybersecurity Risk Management Process

Security Boulevard

Cybersecurity risk management is identifying, assessing, and mitigating risks to an organization's electronic information and systems. The goal of cybersecurity risk management is to reduce.

Risk 83

Reducing Manual Touchpoints to Minimize Risk

Security Boulevard

The fact of the matter is, the more manual touchpoints that an organization has, the greater the risk for human error;[…]. The post Reducing Manual Touchpoints to Minimize Risk appeared first on Iceberg Networks.

Risk 87

Men, Executives Pose Higher Cybersecurity Risk

Security Boulevard

The post Men, Executives Pose Higher Cybersecurity Risk appeared first on Security Boulevard. When it comes to online behaviors, women are far safer than men, according to a wide-ranging survey from SecurityAdvisor.

Risk 108

Spring4Shell: Assessing the risk

CSO Magazine

When a significant vulnerability like Spring4Shell is discovered, how do you determine if you are at risk? You must research false-positive reports and inform management whether the item found is acceptable risk.

Risk 91

Security Sprawl & Digital Risk Management

Security Boulevard

The post Security Sprawl & Digital Risk Management appeared first on Security Boulevard. Security Bloggers Network Digital Risk Management Digital TransformationFor organizations that are already worried about their cybersecurity incident response preparation, the accelerated pace of migration to the cloud brings on new and unique challenges. In an attempt to close these security gaps, organizations spend on the latest cybersecurity tools.

Risk 63

Quantitative Risk Assessment 101

Approachable Cyber Threats

Category Quantitative Risk, Cybersecurity Fundamentals Risk Level. Getting started with quantitative risk assessment is easier than you might think. Try out this starter quantitative risk assessment spreadsheet we developed. Download Quantitive Risk Assessment Spreadsheet.

Reducing Cybersecurity Risk With Minimal Resources

Lohrman on Security

Risk 220

Insider Risk Management or Insider Threat Surveillance?

Security Boulevard

The risk from malicious insiders has long been top-of-mind among security professionals. Addressing the risk is more complicated. The post Insider Risk Management or Insider Threat Surveillance? The post Insider Risk Management or Insider Threat Surveillance?

Qualys Unfurls Ransomware Risk Assessment Service

Security Boulevard

Qualys today launched a Ransomware Risk Assessment Service through which organizations can proactively identify, prioritize, track and ultimately remediate assets that are vulnerable to ransomware attacks.

Risk 95