logo
August 4, 2023 | Ilia Sotnikov

The Importance of Security Risk Assessments and How to Conduct Them

IT risk assessments are vital for cybersecurity and information security risk management in every organization today. By identifying threats to your IT systems, data and other resources and understanding their potential business impacts, you can prioritize your mitigation efforts to avoid costly...
January 18, 2022 | Mike Tierney

What Is Enterprise Information Security Architecture?

Spending on security and risk management is soaring worldwide. But exactly which improvements should you focus on next to best strengthen your cybersecurity program? For many organizations, building a solid information security architecture should be at the top of the list. Read on to learn how...
September 25, 2020 | Ryan Brooks

Data Privacy Solutions: How to Choose the Right One

Data privacy solutions are crucial for complying with privacy regulations and maintaining security. In the first nine months of 2019, there were 5,183 reported data breaches, with 7.9 billion records exposed, according to the Data Breach Quickview. Modern regulations, such as GDPR and CCPA, require...
July 24, 2020 | Mike Tierney

Quantitative Risk Analysis: Annual Loss Expectancy

Risk assessment is an essential component of risk management. It enables you to determine potential hazards that may negatively affect specific projects or result from certain decisions. There are two types of risk analysis — quantitative and qualitative: Quantitative risk analysis is an...
June 10, 2020 | Ryan Brooks

Cybersecurity Assessment: Definition and Types

According to the national Common Vulnerabilities and Exploits (CVE) database, there are more than 11,000 known vulnerabilities in commonly used software and systems. IBM has calculated that breaches of these vulnerabilities cost large enterprises $3.92 million on average; for 60% of those breaches,...
June 2, 2020 | Ilia Sotnikov

Congratulations, you’re a CISO! Now what?

There is no escaping the fact that information security incidents can serious damage a company or even put it out of business. As organizations recognize the need to connect business risks with IT strategy, they are increasingly focusing on one person: their Chief Information Security Officer...
May 29, 2020 | Yelena Geras

Improving Security through Vulnerability Management

The battle for information security has been escalating for a long time, but the recent explosion in remote work has taken the struggle to a whole new level. IT and security teams already overwhelmed by a constant flood of incoming data, cloud technologies and stringent compliance regulations are...
April 7, 2020 | Ryan Brooks

Risk Analysis Example: How to Evaluate Risks

Organizations are struggling with risks on multiple fronts, including cybersecurity, liability, investment and more. Risk analysis, or risk assessment, is the first step in the risk management process. IT risk analysis focuses on the risks that both internal and external threats pose to the...
March 20, 2020 | Ryan Brooks

Beginner’s Guide to IT Risk Management

Managing risk is at the heart of every enterprise. Decisions about finance, marketing, expansion and human resources all include some level of risk. When enterprises evaluate their IT-related risks, factors that come into play include security, access, data handling and regulatory compliance...
December 5, 2019 | Matt Middleton-Leal

How to Reduce Cybersecurity Complexity and Successfully Manage Risks

Managing cyber risks is an increasingly difficult challenge. Even as businesses generate more and more data and adopt new technologies and processes, cybercriminals are busy developing new attack strategies and more sophisticated malware. It is little wonder that the number of data breaches has...
Show more articles
...