Tag

Risk Management

Are Browser Extensions Putting Your Enterprise Data at Risk?
Cyber Security
Are Browser Extensions Putting Your Enterprise Data at Risk?

The pervasive use of browser extensions in the workplace is undeniable, from simple spell checkers to sophisticated Generative AI (GenAI) tools. Not many IT and security professionals are aware, however, that these seemingly harmless tools could become a significant risk to enterprise data security. Excessive permissions granted to browser extensions create an underestimated threat surface, potentially jeopardizing the organization’s sensitive

Read More
Upgrade to Dynamics 365 for Scalable, Efficient Financial Management
Enterprise Applications
Upgrade to Dynamics 365 for Scalable, Efficient Financial Management

In today’s fast-paced business environment, companies are constantly looking for ways to manage their finances more efficiently while ensuring scalability is not compromised. Legacy accounting tools, once sufficient, are increasingly incapable of meeting the growing demands of modern enterprises. Consequently, businesses face inefficiencies and compliance risks that hinder their performance. Transitioning to Microsoft Dynamics 365 Business Central presents a solution

Read More
How Is QBE Leading the Charge in Cyber Insurance Innovation?
FinTech Insurance
How Is QBE Leading the Charge in Cyber Insurance Innovation?

In an era defined by digital transformation, businesses face increasingly sophisticated cyber threats that can disrupt operations and cause significant financial losses.With strategic cyberattacks projected to intensify in the coming years, safeguarding digital assets has never been more crucial. Enter QBE Insurance Group, a pioneer in cyber insurance innovation, leveraging partnerships with cutting-edge start-ups to deliver advanced solutions. The company’s

Read More
Hertz Data Breach Tied to Cleo Software Flaws Affects Thousands
Cyber Security
Hertz Data Breach Tied to Cleo Software Flaws Affects Thousands

A significant data breach has impacted Hertz Corporation due to vulnerabilities within the Cleo file transfer software. This incident, which took place between October and December 2024, involved the theft of sensitive personal data by an unauthorized third party. Hertz discovered the breach on February 10, 2025, and concluded its data analysis on April 2, revealing that over 3,400 Maine

Read More
Can We Rely on Single-Source Funding for Global Cybersecurity?
Cyber Security
Can We Rely on Single-Source Funding for Global Cybersecurity?

The reliance on single-source funding for global cybersecurity efforts introduces significant risks and vulnerabilities. The recent events surrounding the funding of the Common Vulnerabilities and Exposures (CVE) program have sparked a critical debate on this issue. The CVE program, which is a pivotal global database designed to track and report security flaws, faces uncertainties when its funding is solely dependent

Read More
Is Cyber Espionage Driving the Cyber Insurance Boom?
Cyber Security
Is Cyber Espionage Driving the Cyber Insurance Boom?

The constantly evolving landscape of cybersecurity threats has prompted many organizations to reconsider their approach to protection and resilience. Among these growing concerns, cyber espionage has emerged as a prominent threat, influencing the surge in demand for cyber insurance. This article delves into how the rise in cyber espionage might be driving the dramatic growth in the cyber insurance market.

Read More
Is Your Device at Risk from the Erlang SSH Vulnerability?
Cyber Security
Is Your Device at Risk from the Erlang SSH Vulnerability?

A critical security vulnerability has been discovered in the Erlang/Open Telecom Platform (OTP) SSH implementation, arousing significant concern among security professionals and organizations reliant on this technology. Known as CVE-2025-32433, this flaw has garnered a maximum Common Vulnerability Scoring System (CVSS) score of 10.0, unmistakably indicating its severity and potential for exploitation. The vulnerability stems from the improper handling of

Read More
Congress Pushes for Decade-Long Extension of Cybersecurity Act
Cyber Security
Congress Pushes for Decade-Long Extension of Cybersecurity Act

In a bipartisan effort to bolster national cybersecurity, Congress is pushing for a decade-long extension of the Cybersecurity Information Sharing Act (CISA). Co-sponsored by Senators Gary Peters (D-Mich) and Mike Rounds (R-SD), the bill aims to extend the provisions of the act before it hits its expiration in September. CISA, which was passed in 2015, serves as a critical legal

Read More
Hertz Data Breach Exposes Customer Information Due to Zero-Day Attack
Cyber Security
Hertz Data Breach Exposes Customer Information Due to Zero-Day Attack

In a significant and concerning development for both the automotive rental industry and cybersecurity circles, Hertz Corporation experienced a massive data breach that compromised sensitive customer information. The breach resulted from a zero-day vulnerability in Cleo Communications’ file transfer software, which exposed a wide array of personal data belonging to customers and highlighted the risks and growing trend of ransomware

Read More
Are Your Non-Human Identities Secure Against AI Risks?
Cyber Security
Are Your Non-Human Identities Secure Against AI Risks?

The integration of artificial intelligence (AI) within enterprise security has experienced a significant transformation. AI agents have evolved from experimental technologies to essential business tools capable of performing complex tasks automatically. This shift has provided remarkable opportunities for enhancing operational efficiency and innovation within organizations. However, with the increased reliance on AI comes an array of risks that must be

Read More
AI and RPA Revolutionizing Financial Services in 2025
Robotic Process Automation In Fintech
AI and RPA Revolutionizing Financial Services in 2025

Nicholas Braiden, an early adopter of blockchain and a seasoned FinTech expert, has been at the forefront of advising startups on leveraging technology to drive innovation. He champions the potential of financial technology to reshape digital payment and lending systems. In today’s interview, we delve into how automation is transforming the financial landscape and the data behind this revolutionary change.

Read More
Can DeepSeek’s AI Advancements Escalate US-China Tensions?
AI and ML
Can DeepSeek’s AI Advancements Escalate US-China Tensions?

The advent of DeepSeek, a cutting-edge AI technology originating from China, has sparked considerable conversations around its implications for privacy, data security, and geopolitics. This announcement aligns with the ongoing AI arms race between the US and China, bringing the intersections of technological innovation, economic rivalry, and national security to the fore. For Chief Information Security Officers (CISOs) and security

Read More