home.aspx
 
EVENTS

Quantifying the benefit of cyber security investments webinar
QUANTIFYING THE BENEFIT OF CYBER SECURITY INVESTMENTS WEBINAR
April 10-10, 2019
With spending on information security products and services forecast by Gartner to increase 8.7% to $124 billion in 2019, management is rightly requesting financial appraisals of cyber security investment proposals. Security solutions are implemented to reduce risk but, until now estimating potentia...

Acuity Risk Management


Acuity Risk Management is the author of STREAM, an innovative risk and compliance software tool that can be quickly and easily configured to create a fully tailored enterprise risk and compliance management solution. Applicable to any business sector and for any type of risk, STREAM provides business managers with valuable ‘real-time’ visibility of risk and compliance status in relation to business targets and risk appetite. You can download our STREAM risk management software and training packs free of charge and get started. Using the free download you can configure your own GRC solution and use this on a single computer within your organisation and supply chain or to provide services to others. You can use the free download to develop and pilot your Enterprise GRC solution for specific management systems, such as information risk, IT governance, health & safety, environmental, business continuity and supply chain risk management. You can use STREAM Instead of spreadsheets for corporate risk registers and reporting or you can pilot an integrated Enterprise Risk Management software solution.

RELATED NEWS


A newly discovered ransomware family called "GIBON" is targeting all files on machines that it has managed to infect, except those located in the Windows folder. The ransomware is being sold on underground criminal forums for $500 and has been available there since at least May 2017....
SECURITY WEEK
READ MORE

I spend a fair bit of time discussing the concepts of security operations and incident response with a diverse set of audiences. I'm always a bit taken aback when I come across people who don't see the need to perform security operations and incident response....
BIZJOURNALS
READ MORE

Imagine getting a call from your company's IT department telling you your workstation has been compromised and you should stop what you're doing immediately...
COMPUTERWORLD
READ MORE

There’s a showdown going down between a global network of cyber criminals and the world’s largest corporations, governments and cybersecurity companies....
FORBES
READ MORE

U.S. government agencies have invested time, effort and significant funding in the last several years to meet the challenges of cybersecurity threats. Unfortunately, the payoff has been disappointing, according to a report from the ISC2 Foundation, an affiliate of the International Information Systems Security Certification Consortium....
TECHNEWSWORLD
READ MORE

iOS 6 introduced several security mitigations to make it more difficult for hackers to leverage well-known attacks against operating systems – such as buffer overflows and the zone free list pointer overwrite. Such mitigations, including memory layout randomization, depend on the generation of a random number at boot. So with their introduction in iOS 6, Apple included a new PRNG called early_random() that, explains Azimuth researcher Tarjei Mandt, "leveraged a fairly simple generator...
INFOSECURITY-MAGAZINE
READ MORE

EVENTS

Quantifying the benefit of cyber security investments webinar
QUANTIFYING THE BENEFIT OF CYBER SECURITY INVESTMENTS WEBINAR
April 10-10, 2019
With spending on information security products and services forecast by Gartner to increase 8.7% to $124 billion in 2019, management is rightly requesting financial appraisals of cyber security investment proposals. Security solutions are implemented to reduce risk but, until now estimating potentia...