ChatGPT for cyber risk management: an opportunity, or a threat? | Read here >>

CVE-2022-3656 in Google Chrome: How to fix the new “SymStealer” vulnerability | Read here >>

New report: Get a 360° view of the cyber risk landscape in 2022 and recommendations for 2023 | See the full report >> 

ChatGPT for cyber risk management: an opportunity, or a threat? | Read here >>

CVE-2022-3656 in Google Chrome: How to fix the new “SymStealer” vulnerability | Read here >>

New report: Get a 360° view of the cyber risk landscape in 2022 and recommendations for 2023 | See the full report >> 

Compliance in the cloud: 5 things you need to know

Cloud transformation offers many benefits to the modern enterprise. But it also presents significant challenges. It takes a lot of research and planning. It calls for expertise in the new cloud-based model of delivering IT. And it can potentially involve a significant amount of application redesign and coding work. But it also requires a fresh… Continue reading Compliance in the cloud: 5 things you need to know

Get Fix Done with Compliance Risk Assessment

The rapid increase in fraud and business interruption caused by cyber attacks is behind the growing focus on security—particularly personal data protection—by regulators. The introduction of the GDPR in Europe in 2018, and local and national developments in the United States, have been an eye-opener for organizations that previously considered data protection important but a… Continue reading Get Fix Done with Compliance Risk Assessment

Cyber Risks and the Origins of the Vulnerability Flood

According to CVE Details, the number of vulnerabilities reported to date in 2018 (6559) already tops the total number of vulnerabilities reported in all of 2016 (6447). If nothing dramatic changes, the list seems on track to at least match last year’s record of over 14,600 reported vulnerabilities, if not to top it.