Nathan Eddy works as an independent filmmaker and journalist based in Berlin, specializing in architecture, business technology and healthcare IT. He is a graduate of Northwestern University’s Medill ...
Adam Stone writes on technology trends from Annapolis, Md., with a focus on government IT, military and first-responder technologies. The Pentagon plans to change the way it addresses cybersecurity ...
The Department of War (DoW) has announced the implementation of a groundbreaking Cybersecurity Risk Management Construct (CSRMC), a transformative framework to deliver real-time cyber defense at ...
A ship captain will identify potential risks to their boat, cargo and crew, and put in place strategies to mitigate these risk factors. Risks vary from vessel to vessel; the captain of an enormous ...
The Defense Department’s Office of the Chief Information Officer has officially kicked off its effort to improve how the Pentagon manages cybersecurity risks with advanced automation and continuous ...
The software maker’s Security Risk Management Framework (SRMF) helps leadership prioritize mitigation decisions and ensures everyone is informed about the latest cybersecurity challenges and risks.
Cyber risk management must focus on practical, standards-aligned programs and regulatory readiness, with role-based training ...
This content is provided by an external author without editing by Finextra. It expresses the views and opinions of the author. Compliance with the amendments will be required from 31 January 2026. The ...
As the U.S. banking sector enters a new wave of consolidation, are institutions asking the right cybersecurity questions ...
Boards of directors play an important role in managing the strategic risks faced by their organizations, particularly in sectors with high-risk operational technology (OT) environments such as energy, ...
A cyber insurance risk assessment finds the systems and assets most at risk of cyberattack. Learn about cyber insurance and ...
Is your organization’s cybersecurity framework able to withstand a new generation of sophisticated attackers? If it isn’t, it’s time to rethink and redesign your approach to cyber risk. Cybersecurity ...