home.aspx
 
EVENTS

The RSA Conference 2020
THE RSA CONFERENCE 2020
July 15-17, 2020
RSA Conference has been a driving force behind the world’s cybersecurity agenda. The central point where people from around the world gather to share, learn and grow. And the place that provides a forum for innovation and partnership. It’s even more important today to have these points o...

WASHINGTON DC CYBERSECURITY CONFERENCE
WASHINGTON DC CYBERSECURITY CONFERENCE
July 23-23, 2020
More than 30,000 customers worldwide—including nearly half the global Fortune 500—rely on RSA’s business-driven security™ strategy for cyber threat detection and response, identity and access management, online fraud prevention, and governance, risk and compliance solutions. ...

Acuity Risk Management

SHARESHARESHARE
Acuity Risk Management is the author of STREAM, an innovative risk and compliance software tool that can be quickly and easily configured to create a fully tailored enterprise risk and compliance management solution. Applicable to any business sector and for any type of risk, STREAM provides business managers with valuable ‘real-time’ visibility of risk and compliance status in relation to business targets and risk appetite. You can download our STREAM risk management software and training packs free of charge and get started. Using the free download you can configure your own GRC solution and use this on a single computer within your organisation and supply chain or to provide services to others. You can use the free download to develop and pilot your Enterprise GRC solution for specific management systems, such as information risk, IT governance, health & safety, environmental, business continuity and supply chain risk management. You can use STREAM Instead of spreadsheets for corporate risk registers and reporting or you can pilot an integrated Enterprise Risk Management software solution.
SHARESHARESHARE

RELATED NEWS


In response to cyber-defenders’ increasing use of AI technologies, malicious actors are discussing their potential application for criminal use. Research from Control Risks, the specialist global risk consultancy, shows that cyber-threat actors are actively exploring the development of innovative new techniques to use these technologies and tools to enhance their capabilities. For instance, in the post-infection phase, clusters of compromised devices, dubbed hivenets, could develop the abi...
INFOSECURITY MAGAZINE
READ MORE

Hackers have been breaking into home routers to change DNS server settings and hijack the traffic to redirect it to malicious sites, according to Troy Mursch, security researcher for Bad Packets. Researchers have detected different types of attacks that are targeting consumer routers, all of which were reportedly traced back to hosts on the Google Cloud Platform (AS15169) network. Mursch detailed three different waves of findings, which started in December 2018. In the most recent wave, discover...
INFOSECURITY MAGAZINE
READ MORE

The methodology is data-driven, using an organization’s existing sources of security data to set parameters that give stakeholders a clear alert when their business objectives are at risk. The idea of course is to enable enterprises and other entities to determine their overall risk posture, but also to proactively address security risks before they impact their business. When threats or incidents impact stakeholder objectives, IT departments want to quickly identify the source of the risk...
INFOSECURITY-MAGAZINE
READ MORE

"Microsoft has used the last Patch Tuesday for the now unsupported Windows Server 2003 to hit sysadmins with a hefty workload of 14 bulletins – four of them critical – patching 59 vulnerabilities.

The four critical updates include a patch for Internet Explorer (MS15-065) which covers a whopping 29 vulnerabilities including remote code execution flaws."...

INFOSECURITY MAGAZINE
READ MORE

British netizens have bombarded Google with over 18,000 requests asking the search engine to remove results about them since a European court ruled in May that citizens deserved the “right to be forgotten” in certain circumstances....
INFOSECURITY MAGAZINE
READ MORE

Terranova WW Corporation, a leader in Gartner Magic Quadrant for Security Awareness CBT 2015, announced today that Info Security Products Guide, the industry's leading information security research and advisory guide, has named Terranova's Complete Security Awareness Platform v14 as a finalist for the 12th Annual 2016 Global Excellence Awards, in the Security Training and Educational Programs (any type of training) category. These prestigious global awards recognize security and IT vendo...
CNW
READ MORE

EVENTS

The RSA Conference 2020
THE RSA CONFERENCE 2020
July 15-17, 2020
RSA Conference has been a driving force behind the world’s cybersecurity agenda. The central point where people from around the world gather to share, learn and grow. And the place that provides a forum for innovation and partnership. It’s even more important today to have these points o...

WASHINGTON DC CYBERSECURITY CONFERENCE
WASHINGTON DC CYBERSECURITY CONFERENCE
July 23-23, 2020
More than 30,000 customers worldwide—including nearly half the global Fortune 500—rely on RSA’s business-driven security™ strategy for cyber threat detection and response, identity and access management, online fraud prevention, and governance, risk and compliance solutions. ...