Search results: risk

Quantifying and Buying Down Cybersecurity Risk

Seven Ways DSPM Helps CISOs Buy Down Cyber Risk

Have you heard someone indicate they buy down risk? In today’s digital economy, cyber risk is a top concern of everyone from the Board and CEO to the CFO and ultimately the ...
Test & Evaluation Techniques for Meeting M-24-10 Mandates to Manage Generative AI Risk

Test & Evaluation Techniques for Meeting M-24-10 Mandates to Manage Generative AI Risk

Overview The release of the National Institute of Standards and Technology (NIST)’s AI Risk Management Framework (AI RMF) helped put a framework around how testing would enable organizations to manage and mitigate ...
High-Risk Customers: How to Identify & Mitigate Risky Clients

High-Risk Customers: How to Identify & Mitigate Risky Clients

| | learning center
High-risk customers can endanger your business. Learn how to identify and manage 7 different kinds of high-risk customers to maintain a secure business environment ...

Balbix’s Approach to Cyber Risk Quantification Supercharged by AI

In this third and final post in the series on how AI plays a crucial role in cyber risk management, we will combine what we have learned in the previous posts on ...
Digital Risk Types Demystified: A Strategic Insight into Online Threats

Digital Risk Types Demystified: A Strategic Insight into Online Threats

| | Blog, Topic
Never underestimate the power of technology in shaping your business’s success. The digital landscape is advancing, and the risks of shirking cutting-edge technology are substantial. The future belongs to those who recognize ...

LG Smart TV Vulnerabilities: 91K Devices At Root Access Risk

Several security vulnerabilities have been identified in LG webOS, the operating system running on LG smart TVs. These LG Smart TV vulnerabilities could be exploited to bypass authorization controls and gain root ...

How Rising Cyberattacks Risk Global Economic Stability

| | Blog, Threats and Trends
The International Monetary Fund releases a report each year identifying near-term financial stability risks.  Its ...
Cloud Security Stories: From Risky Permissions to Ransomware Execution

Cloud Security Stories: From Risky Permissions to Ransomware Execution

In the sprawling cloud infrastructure of GlobalTech Inc., a meticulously planned ransomware attack was set in motion by a sophisticated adversary, codenamed Vector. Vector’s objective wasn’t just to encrypt data for a ...

USENIX Security ’23 – On the Security Risks of Knowledge Graph Reasoning

Authors/Presenters: *Zhaohan Xi, Tianyu Du, Changjiang Li, Ren Pang, Shouling Ji, Xiapu Luo, Xusheng Xiao, Fenglong Ma and Ting Wang* Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s ...
Unpacking 5 Risks in Generative AI

A Pandora’s Box: Unpacking 5 Risks in Generative AI

|
A Pandora's Box: Unpacking 5 Risks in Generative AI madhav Thu, 04/18/2024 - 05:07 Generative AI (GAI) is becoming increasingly crucial for business leaders due to its ability to fuel innovation, enhance ...

Secure Guardrails