Security Wire Daily News

Third-party risk management (TPRM) is a comprehensive framework for identifying, assessing, and mitigating risks associated with using external vendors, suppliers, partners and service providers.

Security Wire Daily News - Thu, 06/05/2025 - 2:26pm
Third-party risk management (TPRM) is a comprehensive framework for identifying, assessing, and mitigating risks associated with using external vendors, suppliers, partners and service providers.

WannaCry ransomware is a cyberattack that spread by exploiting vulnerabilities in earlier and unpatched versions of the Windows operating system (OS).

Security Wire Daily News - Thu, 06/05/2025 - 1:17pm
WannaCry ransomware is a cyberattack that spread by exploiting vulnerabilities in earlier and unpatched versions of the Windows operating system (OS).

Risk registers document, prioritize and track an organization's risk, providing organizations with a holistic view of risk and a ready way to communicate their risk strategies.

Security Wire Daily News - Wed, 06/04/2025 - 6:41pm
Risk registers document, prioritize and track an organization's risk, providing organizations with a holistic view of risk and a ready way to communicate their risk strategies.

HashiCorp and IBM have begun to knit together products such as Terraform and Ansible and divulged some roadmap details, but a few potential product overlaps are still unresolved.

Security Wire Daily News - Wed, 06/04/2025 - 11:14am
HashiCorp and IBM have begun to knit together products such as Terraform and Ansible and divulged some roadmap details, but a few potential product overlaps are still unresolved.

Organizations must carefully balance security and UX when implementing account lockout policies.

Security Wire Daily News - Tue, 06/03/2025 - 11:28am
Organizations must carefully balance security and UX when implementing account lockout policies.

The DOGE effect on security is a complex issue. Pursuit of efficiency might be a legitimate goal, but experts caution it can conflict with cybersecurity defenses.

Security Wire Daily News - Mon, 06/02/2025 - 1:50pm
The DOGE effect on security is a complex issue. Pursuit of efficiency might be a legitimate goal, but experts caution it can conflict with cybersecurity defenses.

Compliance automation, also known as automated compliance, is the practice of using technology -- such as applications with AI features -- to perform and simplify compliance procedures.

Security Wire Daily News - Mon, 06/02/2025 - 12:46pm
Compliance automation, also known as automated compliance, is the practice of using technology -- such as applications with AI features -- to perform and simplify compliance procedures.

The DOGE effect on cyber: What's happened and what's next?

Security Wire Daily News - Mon, 06/02/2025 - 7:52am
In this webinar, part of 'CISO Insights' series, cybersecurity experts debate the pros and cons of the Department of Government Efficiency's actions and the impact on their field.

Explore risk maturity models and assessment tools for enhancing enterprise risk management. Improve ERM programs to mitigate risk and gain a competitive edge.

Security Wire Daily News - Mon, 06/02/2025 - 7:32am
Explore risk maturity models and assessment tools for enhancing enterprise risk management. Improve ERM programs to mitigate risk and gain a competitive edge.

Triple extortion ransomware is a type of ransomware attack in which a cybercriminal extorts their victim multiple times -- namely by encrypting data, exposing exfiltrated data and then threatening an additional third attack vector.

Security Wire Daily News - Fri, 05/30/2025 - 4:26pm
Triple extortion ransomware is a type of ransomware attack in which a cybercriminal extorts their victim multiple times -- namely by encrypting data, exposing exfiltrated data and then threatening an additional third attack vector.

Foreign adversaries now infiltrate rival nation resources by using cyberattackers to pose as remote workers. Learn how to protect your organization with tips from this CISO.

Security Wire Daily News - Fri, 05/30/2025 - 2:23pm
Foreign adversaries now infiltrate rival nation resources by using cyberattackers to pose as remote workers. Learn how to protect your organization with tips from this CISO.

Fourth-party risk management (FPRM) is the process of identifying, assessing and mitigating risks that originate from the subcontractors and service providers that an organization's third-party vendors use.

Security Wire Daily News - Fri, 05/30/2025 - 12:12pm
Fourth-party risk management (FPRM) is the process of identifying, assessing and mitigating risks that originate from the subcontractors and service providers that an organization's third-party vendors use.

An explanation of ransomware

Security Wire Daily News - Fri, 05/30/2025 - 9:15am
Ransomware locks an organization out of its data or digital services until it pays up. To minimize attacks, businesses can enhance security, train employees and back up data.

Security for information technology (IT) refers to the methods, tools and personnel used to defend an organization's digital assets.

Security Wire Daily News - Fri, 05/30/2025 - 9:02am
Security for information technology (IT) refers to the methods, tools and personnel used to defend an organization's digital assets.

Many users perform work tasks on their iPhones, relying on mobile VPNs to securely access corporate resources. Learn about VPN options for iPhones and how to set up these systems.

Security Wire Daily News - Thu, 05/29/2025 - 4:10pm
Many users perform work tasks on their iPhones, relying on mobile VPNs to securely access corporate resources. Learn about VPN options for iPhones and how to set up these systems.

Application security teams are understandably worried about how developers use GenAI and LLMs to create code. But it's not all doom and gloom; GenAI can help secure code, too.

Security Wire Daily News - Thu, 05/29/2025 - 12:55pm
Application security teams are understandably worried about how developers use GenAI and LLMs to create code. But it's not all doom and gloom; GenAI can help secure code, too.

Knowing the types of risks businesses commonly face and their applicability to your company is a first step toward effective risk management.

Security Wire Daily News - Thu, 05/29/2025 - 6:25am
Knowing the types of risks businesses commonly face and their applicability to your company is a first step toward effective risk management.

Double extortion ransomware is a type of cyberattack that encrypts a victim's data, like in a traditional ransomware attack, while also adding a second attack vector of stealing that data.

Security Wire Daily News - Wed, 05/28/2025 - 6:06pm
Double extortion ransomware is a type of cyberattack that encrypts a victim's data, like in a traditional ransomware attack, while also adding a second attack vector of stealing that data.

Windows Hello allows desktop admins to manage local Windows authentication with new tools, but the difference between the free and business versions is critical for IT to know.

Security Wire Daily News - Wed, 05/28/2025 - 10:47am
Windows Hello allows desktop admins to manage local Windows authentication with new tools, but the difference between the free and business versions is critical for IT to know.

FileZilla is a free, open source file transfer protocol (FTP) application that enables users to transfer files between local devices and remote servers.

Security Wire Daily News - Thu, 05/22/2025 - 3:08pm
FileZilla is a free, open source file transfer protocol (FTP) application that enables users to transfer files between local devices and remote servers.

Pages