Security Wire Daily News

Subscribe to Security Wire Daily News feed
Updated: 49 min 56 sec ago

Risk appetite and risk tolerance are related, but they don’t mean the same thing. Not knowing the difference can cause big problems for your risk management program.

Thu, 05/22/2025 - 11:05am
Risk appetite and risk tolerance are related, but they don’t mean the same thing. Not knowing the difference can cause big problems for your risk management program.

Red Hat Ansible and HashiCorp reps filled in the blanks about how infrastructure automation tools will more deeply integrate, news welcomed by financial services customers.

Wed, 05/21/2025 - 7:32pm
Red Hat Ansible and HashiCorp reps filled in the blanks about how infrastructure automation tools will more deeply integrate, news welcomed by financial services customers.

A passkey is an alternative user authentication method that eliminates the need for usernames and passwords.

Wed, 05/21/2025 - 3:27pm
A passkey is an alternative user authentication method that eliminates the need for usernames and passwords.

Amazon, Microsoft, Google, Oracle and cloud-agnostic vendors offer cloud key management services. Read up on what each offers and how to choose the right KMS for your company.

Wed, 05/21/2025 - 1:26pm
Amazon, Microsoft, Google, Oracle and cloud-agnostic vendors offer cloud key management services. Read up on what each offers and how to choose the right KMS for your company.

Corporate boards must play an increasingly active role in overseeing cybersecurity strategies. Here's what they need to know, from SEC disclosure requirements to best practices.

Tue, 05/20/2025 - 4:02pm
Corporate boards must play an increasingly active role in overseeing cybersecurity strategies. Here's what they need to know, from SEC disclosure requirements to best practices.

Data security posture management, or DSPM, is an approach that combines technologies and processes to provide a holistic view of a company's sensitive data, including where the data is, who has access to it, how it has been used and its security posture.

Tue, 05/20/2025 - 3:02pm
Data security posture management, or DSPM, is an approach that combines technologies and processes to provide a holistic view of a company's sensitive data, including where the data is, who has access to it, how it has been used and its security posture.

Remote work, while beneficial, presents numerous security risks. Help keep your organization's systems safe with a remote access policy.

Tue, 05/20/2025 - 8:59am
Remote work, while beneficial, presents numerous security risks. Help keep your organization's systems safe with a remote access policy.

Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting from its failure to act in accordance with industry laws and regulations, internal policies or prescribed best practices.

Mon, 05/19/2025 - 4:33pm
Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting from its failure to act in accordance with industry laws and regulations, internal policies or prescribed best practices.

Universal 2nd Factor (U2F) is a physical device that can act as a form of authentication for an account.

Mon, 05/19/2025 - 11:13am
Universal 2nd Factor (U2F) is a physical device that can act as a form of authentication for an account.

A firewall is a network security device that prevents unauthorized access to a network by inspecting incoming and outgoing traffic using a set of predetermined security rules.

Mon, 05/19/2025 - 10:04am
A firewall is a network security device that prevents unauthorized access to a network by inspecting incoming and outgoing traffic using a set of predetermined security rules.

Enterprises are spending big bucks on developing and training proprietary AI models. But cybercriminals are also eyeing this valuable intellectual property.

Mon, 05/19/2025 - 8:59am
Enterprises are spending big bucks on developing and training proprietary AI models. But cybercriminals are also eyeing this valuable intellectual property.

Risk appetite is the amount of risk an organization or investor is willing to take in pursuit of objectives it deems have value.

Fri, 05/16/2025 - 4:15pm
Risk appetite is the amount of risk an organization or investor is willing to take in pursuit of objectives it deems have value.

RSAC Conference 2025

Fri, 05/16/2025 - 5:00am
Follow SearchSecurity's RSAC 2025 guide for insightful pre-conference insights and reports on notable presentations and breaking news at the world's biggest infosec event.

A penetration test, also called a 'pen test,' is a simulated cyberattack on a computer system, network or application to identify and highlight vulnerabilities in an organization's security posture.

Wed, 05/14/2025 - 2:52pm
A penetration test, also called a 'pen test,' is a simulated cyberattack on a computer system, network or application to identify and highlight vulnerabilities in an organization's security posture.

Business resilience is an organization's ability to adapt quickly to disruptions while maintaining continuous business operations and safeguarding people, assets and overall brand equity.

Wed, 05/14/2025 - 12:50pm
Business resilience is an organization's ability to adapt quickly to disruptions while maintaining continuous business operations and safeguarding people, assets and overall brand equity.

Recent Enterprise Strategy Group research found data loss prevention product churn combined with undiscovered data and shadow IT are changing the DLP landscape.

Wed, 05/14/2025 - 9:46am
Recent Enterprise Strategy Group research found data loss prevention product churn combined with undiscovered data and shadow IT are changing the DLP landscape.

To stay on top of new threats, IT pros can test their skills with mobile security training. Explore the top programs to learn about mobile attacks, penetration testing and more.

Tue, 05/13/2025 - 3:18pm
To stay on top of new threats, IT pros can test their skills with mobile security training. Explore the top programs to learn about mobile attacks, penetration testing and more.

Organizations that need to secure mobile users and provide remote access to corporate resources should consider an on-premises or cloud-hosted mobile VPN.

Tue, 05/13/2025 - 1:15pm
Organizations that need to secure mobile users and provide remote access to corporate resources should consider an on-premises or cloud-hosted mobile VPN.

Check out the latest security news from the Informa TechTarget team.

Fri, 05/09/2025 - 5:22pm
Check out the latest security news from the Informa TechTarget team.

The Sarbanes-Oxley Act of 2002 (SOX) is a federal law that established sweeping auditing and financial regulations for public companies.

Fri, 05/09/2025 - 3:20pm
The Sarbanes-Oxley Act of 2002 (SOX) is a federal law that established sweeping auditing and financial regulations for public companies.

Pages