#operational-risk-management

[ follow ]
#cybersecurity
Information security
fromThe Hacker News
4 days ago

The AI Arms Race - Why Unified Exposure Management Is Becoming a Boardroom Priority

The cybersecurity landscape is rapidly evolving, with AI enabling faster and more sophisticated attacks, necessitating advanced defensive strategies.
Information security
fromSecuritymagazine
2 weeks ago

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

Cybersecurity practitioners face data overload, struggling to extract meaningful insights while focusing on relevant threats to reduce business risk.
Bootstrapping
fromEntrepreneur
3 days ago

Your Management Strategy Is Doomed to Fail If You Don't Do This

Effective management focuses on execution through a straightforward approach: face reality, investigate issues, fix them systematically, and own the outcomes.
#citigroup
France news
fromThe Local France
2 days ago

Citigroup orders home-working as US banks in Paris and Frankfurt tighten security

Citigroup has instructed employees in Paris and Frankfurt to work from home due to heightened security concerns following a thwarted attack on a US bank.
France news
fromwww.thelocal.com
2 days ago

Citigroup orders home-working as US banks in Paris and Frankfurt tighten security

Citigroup has instructed employees in Paris and Frankfurt to work from home due to heightened security concerns following a thwarted attack on a US bank.
France news
fromThe Local France
2 days ago

Citigroup orders home-working as US banks in Paris and Frankfurt tighten security

Citigroup has instructed employees in Paris and Frankfurt to work from home due to heightened security concerns following a thwarted attack on a US bank.
France news
fromwww.thelocal.com
2 days ago

Citigroup orders home-working as US banks in Paris and Frankfurt tighten security

Citigroup has instructed employees in Paris and Frankfurt to work from home due to heightened security concerns following a thwarted attack on a US bank.
DevOps
fromInfoQ
4 days ago

Event-Driven Patterns for Cloud-Native Banking: Lessons from What Works and What Hurts

Event-driven architecture introduces complexity and requires careful implementation, especially in regulated environments, to ensure reliability and system evolution.
Cryptocurrency
fromTNW | Blockchain
4 days ago

Multi-Hop Transactions in Crypto. The Compliance Risk Behind Indirect Exposure

Public blockchains present compliance challenges due to multi-hop transactions, complicating the tracking of funds and enforcement of regulations.
Women in technology
fromInfoQ
1 week ago

Security and Architecture: To Betray One Is To Destroy Both

Architecture and security have evolved from separate entities to a deeply connected partnership focused on resilience and protection against threats.
Business
fromhbr.org
1 week ago

How Leaders Can Get Strategic About Energy Costs

Energy management is shifting from a marginal cost issue to a critical board-level concern for resilience and competitiveness.
Podcast
fromSecuritymagazine
1 week ago

What Does It Take to Be an Outstanding CSO or CISO?

Outstanding security leaders often come from non-traditional backgrounds, with 40% of recent CSO-CISO Hall of Fame honorees starting in the private sector.
#ai-security
fromInfoWorld
2 days ago
Information security

Claude Code leak puts enterprise trust at risk as security, governance concerns mount

fromZDNET
1 month ago
Miscellaneous

Rolling out AI? 5 security tactics your business can't get wrong - and why

Information security
fromInfoWorld
2 days ago

Claude Code leak puts enterprise trust at risk as security, governance concerns mount

Leaks threaten Anthropic's market position and raise security concerns about its AI coding tools.
fromZDNET
1 month ago
Miscellaneous

Rolling out AI? 5 security tactics your business can't get wrong - and why

Healthcare
fromEntrepreneur
2 weeks ago

Why Liability Insurance No Longer Works the Way You Think - and What CEOs Must Do About It

Liability insurance has shifted to a shareholder-driven system, requiring leaders to manage claims proactively to avoid costly surprises.
#basel-iii-capital-requirements
Real estate
fromwww.housingwire.com
2 weeks ago

Proposed capital rules set LTV-based mortgage risk weights

Basel III proposals reduce Tier 1 capital requirements for banks while increasing risk sensitivity for mortgages through LTV-based risk weights and eliminating MSR capital deductions in favor of 250% risk weighting.
Real estate
fromwww.housingwire.com
2 weeks ago

Banks eye mortgage growth if Basel III capital rules ease

Bank executives anticipate Basel III recalibration could increase mortgage and MSR attractiveness through lower risk weights and LTV-sensitive capital requirements, though implementation is expected to be gradual.
Real estate
fromwww.housingwire.com
2 weeks ago

Proposed capital rules set LTV-based mortgage risk weights

Basel III proposals reduce Tier 1 capital requirements for banks while increasing risk sensitivity for mortgages through LTV-based risk weights and eliminating MSR capital deductions in favor of 250% risk weighting.
Real estate
fromwww.housingwire.com
2 weeks ago

Banks eye mortgage growth if Basel III capital rules ease

Bank executives anticipate Basel III recalibration could increase mortgage and MSR attractiveness through lower risk weights and LTV-sensitive capital requirements, though implementation is expected to be gradual.
Productivity
fromyusufaytas.com
2 weeks ago

Capacity Is the Roadmap

Roadmap success depends on realistic capacity planning, not just prioritization; maintenance, interruptions, and coordination consume significant resources that must be accounted for.
Online learning
fromeLearning Industry
2 weeks ago

Can An LMS Really Reduce Compliance Risk Before It Happens?

A strategically positioned LMS reduces compliance risk by ensuring consistent policy communication across organizations and enabling rapid regulatory updates, transforming it from a reporting tool into a proactive risk management system.
fromMedium
2 weeks ago

TruRisk : Qualys' Approach for Prioritizing Asset for Patch Management

TruRisk is designed to aggregate vulnerability data at the asset level and convert it into a measurable, business-aligned cyber risk score. Rather than evaluating vulnerabilities in isolation, TruRisk calculates a consolidated risk value per asset by helping security teams understand which systems pose the greatest operational and strategic risk.
Business intelligence
EU data protection
fromTNW | Ecosystems
2 weeks ago

DORA compliance: most European financial firms still aren't ready

Europe's financial institutions struggle to comply with the Digital Operational Resilience Act, with many lacking confidence in meeting the 2025 deadline.
Cryptocurrency
fromBitcoin Magazine
2 weeks ago

5 Ways The Fed's Basel III Pivot Unlocks Institutional Bitcoin Custody

The Federal Reserve's Basel III Endgame proposal eliminates punitive capital requirements for Bitcoin held by banks, removing the primary regulatory barrier to institutional cryptocurrency custody services.
Bootstrapping
fromEntrepreneur
2 weeks ago

Don't Let New Regulations Overwhelm You - Take Control in 30 Days or Less

Regulatory compliance failures typically result from poor internal organizational response rather than the rules themselves, and treating each new regulation as a structured 30-day operational project with clear ownership prevents chaos and ensures consistent execution.
Privacy professionals
fromMedCity News
2 weeks ago

The Evolving Landscape of Privacy and Cybersecurity: Essential Strategies for Legal and Compliance Professionals - MedCity News

Organizations must combine strong controls with comprehensive employee training and accountability culture to effectively protect sensitive data and comply with evolving privacy laws.
fromMedium
2 weeks ago

Mastering Azure Governance: Why It Matters and How to Get Started

Azure Governance is the set of policies, processes, and technical controls that ensure your Azure environment is secure, compliant, and well-managed. It provides a structured approach to organizing subscriptions, resources, and management groups, while defining standards for naming, tagging, security, and operational practices.
DevOps
Privacy professionals
fromwww.housingwire.com
2 weeks ago

Reducing risk: Why logging, protection, and review matter

Application logs are critical cybersecurity safeguards that provide visibility into system behavior, enabling early detection of security threats and operational issues in real estate and mortgage lending organizations.
DevOps
fromInfoWorld
2 weeks ago

Cloud-based LLMs risk enterprise stability

Enterprises must return to architectural resilience principles when adopting cloud-hosted LLMs to mitigate risks from increasingly common outages that cause widespread business disruption.
Business intelligence
fromwww.housingwire.com
3 weeks ago

Banks adopt AI fast but lack strategy and governance

Organizations prioritize operational efficiency in AI investment, but face significant data infrastructure gaps and regulatory uncertainty that hinder transition from experimentation to strategic deployment.
Miscellaneous
fromBusiness Matters
1 month ago

Programmatic Risk Management for Derivative Trading

Leverage in derivatives requires real-time programmatic risk controls embedded in trading architecture to prevent rapid account depletion from market moves.
Information security
fromZDNET
1 week ago

1 in 2 security leaders say they're not ready for AI attacks - 4 actions to take now

AI-powered cybercrime is a significant and growing threat to businesses, with many feeling unprotected.
Real estate
fromwww.housingwire.com
3 weeks ago

Private credit didn't fix middle-market CRE. It delayed a reckoning

Private credit's market expansion masked fundamental inefficiencies in commercial real estate lending that now surface as refinancing accelerates in a higher-rate environment.
Bootstrapping
fromEntrepreneur
3 weeks ago

Why Chasing More Revenue Won't Fix Your Financial Struggles

Pursuing revenue growth without stabilizing internal systems, costs, and processes amplifies inefficiencies and creates fragile, unsustainable businesses instead of profitable ones.
DevOps
fromComputerWeekly.com
3 weeks ago

Strong security balances consolidation and best-of-breed capabilities | Computer Weekly

Security platformisation delivers genuine value through native data correlation across integrated telemetry sources, not just operational efficiency from consolidation.
Information security
fromComputerWeekly.com
2 weeks ago

Beyond integration theatre: Building stronger cyber platforms | Computer Weekly

Integration layers between security platforms, not the platforms themselves, have become the primary enterprise security risk requiring rigorous governance of delegated trust.
fromComputerWeekly.com
1 month ago

Weighing up the enterprise risks of neocloud providers | Computer Weekly

Neocloud providers, which include the likes of Nscale, CoreWeave and Carbon3.ai, are having a somewhat disruptive impact on the market by making huge commitments to build out hyperscale datacentres in support of the UK government's AI growth agenda. These providers are also taking up capacity in colocation datacentres that some of the hyperscale cloud giants previously committed to renting space in, before pulling out.
Miscellaneous
Information security
fromThe Hacker News
2 weeks ago

Why Security Validation Is Becoming Agentic

Security validation tools operate in silos while attackers exploit interconnected systems, creating a structural blind spot that Agentic Exposure Validation can address through continuous, autonomous, context-aware assessment.
Business intelligence
fromLondon Business News | Londonlovesbusiness.com
1 month ago

Why UK business leaders turn to corporate intelligence to mitigate hidden risks - London Business News | Londonlovesbusiness.com

UK business leaders increasingly rely on corporate intelligence to navigate geopolitical risks, supply chain vulnerabilities, cybersecurity threats, and regulatory pressures that traditional governance tools cannot adequately address.
Law
fromBusiness Matters
1 month ago

How Unexpected Workplace Incidents Can Disrupt Business Continuity

Unexpected workplace incidents can quickly disrupt operations, creating legal liability, staffing strain, lost momentum, and eroded trust for small and mid-sized businesses.
Information security
fromComputerWeekly.com
3 weeks ago

How CISOs can build a truly unified and resilient security platform | Computer Weekly

Modern enterprise security requires rethinking architecture from perimeter defense to distributed asset protection across decentralized networks and cloud environments.
Information security
fromSecurityWeek
3 weeks ago

How to 10x Your Vulnerability Management Program in the Agentic Era

Agentic AI cyberattacks are actively occurring, forcing vulnerability management to evolve from static scanning to continuous, contextual, autonomous remediation systems.
#immigration-enforcement
Privacy technologies
fromTechCrunch
1 month ago

Complyance raises $20M to help companies manage risk and compliance | TechCrunch

Complyance uses AI agents to run continuous governance, risk, and data compliance checks for enterprises, automating manual audits and assessing vendor risk.
Careers
fromTheregister
2 months ago

ATM maintenance tech broke the bank by forgetting a key

An ATM technician accidentally took a bank branch's ATM keys, realized the mistake, reported it, and returned to hand the keys over.
Information security
fromSecuritymagazine
1 month ago

The Great Security Culture Shift: Building a Proactive Defense in an Era of Advanced Threats and Social Engineering

Hackers exploit DLL side-loading on trusted platforms like LinkedIn to deliver malware through seemingly legitimate file attachments, bypassing traditional security defenses and compromising entire corporate networks.
Germany news
fromFortune
2 months ago

German prosecutors' raid on Deutsche Bank hurts the lender's attempts to leave its long history of compliance failures in the past | Fortune

Deutsche Bank was raided in a money-laundering probe tied to 2013–2018 transactions while reporting an $8.5 billion 2025 profit and announcing a $1bn+ share buyback.
fromFortune
2 months ago

As risk skyrockets, current and former CFOs are in demand for audit committees | Fortune

As audit committees confront a rapidly expanding risk landscape, their role in corporate governance is being reshaped. Boards have often turned to current and former CFOs as independent directors, particularly for audit committees, because of their ability to translate complex operational and financial realities into effective oversight.For example, this month, J. Michael Hansen, former EVP and CFO of Cintas Corporation, was appointed to the audit committee at Paychex.
Business
fromTearsheet
1 month ago

The 'discovery' problem in embedded finance - and how OMB Bank found the right fintech partner - Tearsheet

For Missouri-based community bank OMB Bank, finding the right fintech partner used to be a slow, manual process. Executive Vice President and Chief of Staff Jessica Sims recalls working from static PDFs of the bank's preferences, followed by endless back-and-forth emails whenever a fintech expressed interest. The process worked, but painfully slowly, and promising opportunities often slipped through the cracks.
Venture
Real estate
fromwww.housingwire.com
1 month ago

Basel capital rules may be revised to boost bank mortgage lending

Overly strict capital treatment of mortgage servicing rights has reduced bank participation and made mortgage activities disproportionately costly relative to their risks.
fromSecurityWeek
1 month ago

Four Risks Boards Cannot Treat as Background Noise

Rather than stolen data making headlines, it was business stoppage that triggered attention. Moving into 2026, the board's focus should be on ensuring business continuity and building resilience in the face of emerging risks generated by AI usage and attack vectors, quantum computing and geopolitics.
Information security
Business
fromHarvard Business Review
2 months ago

Where to Look for Ethical Risk Inside a Company

Unchecked integrity gaps—overlooked conflicts of interest, offensive behavior, or aggressive sales practices—can escalate into severe reputational and financial harm.
fromBusiness Matters
2 months ago

Compliance Is the New Creative: Why Your Channel Partners Are Your Biggest Liability (and How to Fix It)

If your partner in Munich mishandles customer data, or your reseller in Paris uses a "black box" AI tool to generate deceptive ads, it isn't just their reputation on the line. It's yours. With the EU AI Act now in full swing and GDPR entering its "mature enforcement" era, the distance between a partner's mistake and your company's $20 million fine has never been shorter.
EU data protection
Artificial intelligence
fromEntrepreneur
1 month ago

The Quiet AI Threat Can Damage Your Company Without Warning

Corrupted training data undermines AI effectiveness, causing poor decisions, wasted resources, loss of trust, and erosion of competitive advantage.
Information security
fromThe Hacker News
1 month ago

Top 5 Ways Broken Triage Increases Business Risk Instead of Reducing It

Triage failures occur when decisions are made without execution evidence, causing false positives, missed threats, and higher costs; interactive sandboxes enable evidence-backed verdicts within seconds.
fromLondon Business News | Londonlovesbusiness.com
1 month ago

Owner dependence is one of the biggest hidden risks undermining business value - London Business News | Londonlovesbusiness.com

New analysis published today (6 February 2026) reveals a structural issue that is eroding valuations, limiting exits, and trapping founders in their businesses, with around 80% of UK private companies failing to sell. The White Paper, The Owner Dependence Problem in UK SME Businesses, published by Exit Factor, highlights how excessive reliance on founders is undermining business value across the UK SME sector. The White Paper analyses businesses with annual revenues between £3m and £30m and demonstrates how owner dependence materially restricts strategic options for owners.
Business
fromDbmaestro
4 years ago

5 Pillars of Database Compliance Automation |

There is a growing emphasis on database compliance today due to the stricter enforcement of compliance rules and regulations to safeguard user privacy. For example, GDPR fines can reach £17.5 million or 4% of annual global turnover (the higher of the two applies). Besides the direct monetary implications, companies also need to prioritize compliance to protect their brand reputation and achieve growth.
EU data protection
Artificial intelligence
fromFast Company
1 month ago

Do you really know what 'agent' means? If not, you're putting your company at risk

The term 'AI agent' has been stretched to include many different systems, creating confusion that distorts public debate and hinders enterprise adoption and strategy.
Business
fromBusiness Matters
2 months ago

The ROI of Practice Automation: A Guide for Finance and Accounting Businesses

Automation eliminates repetitive administrative tasks in accounting firms, freeing time to serve clients, grow teams, and improve work-life balance.
Real estate
fromwww.housingwire.com
2 months ago

Distressed assets, AI fraud complicating title insurance risk

Layered validation and synchronized countermeasures are essential to combat increasingly sophisticated, AI-driven title insurance fraud amid uneven property market risks and rising bad actors.
Information security
fromSecuritymagazine
1 month ago

From the Outside In: A Smarter Approach to Vendor Access

Organizations should shift from employee-centric access control to perimeter-focused security strategies to better manage risks from external vendors, contractors, and temporary workers.
Information security
fromTheregister
1 month ago

Threat intelligence supply chain is full of weak links

China's ban on foreign security software threatens the global threat intelligence ecosystem by risking data fragmentation and weakening international cybersecurity collaboration.
fromBusiness Matters
2 months ago

How Business Recovery and Insolvency Can Help Avoid Liquidation

The weight of mounting debts, unmanageable cash flow issues, and the pressure from creditors can quickly lead a company to the brink of liquidation. However, insolvency and business recovery processes, when handled properly, can offer a lifeline to businesses in distress. One such company that specializes in these services is BABR (Bailey Ahmad Business Recovery), which provides essential strategies and expert guidance to help businesses navigate the complex waters of financial recovery and avoid the often devastating consequences of liquidation.
Business
Business
fromBusiness Matters
2 months ago

Top 8 Risks That Can Shut Down a Small Business and How Insurance Prevents Them

Insurance protects small businesses from incidents that could cause legal fees, compensation claims, lost income, and potential closure.
fromLondon Business News | Londonlovesbusiness.com
2 months ago

When a simple fall becomes a costly lesson for modern businesses - London Business News | Londonlovesbusiness.com

Small details often shape how people view a business, and one unexpected fall inside a store or office can quickly shift that perception. Many companies overlook the idea that a single misstep can lead to serious injuries, financial stress and long term reputational issues. While organisations spend resources on branding, client retention and digital visibility, they sometimes ignore basic safety features that protect customers and employees.
Business
Business
fromEntrepreneur
1 month ago

Why 67% of Strategic Plans Fail to Deliver Results

Lack of institutional authority, not execution capability, prevents strategic plans from being implemented; embedded operators with decision-making power drive results.
fromFortune
1 month ago

Oracle defused 'the key risk going into 2026,' BofA argues, but the market isn't buying it | Fortune

"Every morning the opening screen on my Bloomberg is what's going on with CDS spreads on Oracle debt," Morgan Stanley Wealth Management CIO Lisa Shalett told Fortune in October, seeming to speak for a market that was increasingly worried about the bursting of a bubble in artificial intelligence (AI).
Business
Business
fromHarvard Business Review
2 months ago

How One Company Achieved a Bold Transformation-Despite Major Unknowns

A pharmaceutical division repeatedly debated a bold transformation to flatten decision-making and empower employees but failed to implement the change.
Information security
fromTechzine Global
2 months ago

From vulnerability whack-a-mole to strategic risk operations

Shift security from counting vulnerabilities to strategic risk operations that prioritize exposure, value at risk, and measurable business outcomes.
Information security
fromwww.housingwire.com
2 months ago

Reducing risk: The importance of administrative access responsibilities

Clearly defined and strictly managed administrative access reduces cybersecurity risk while preserving operational efficiency in real estate, title insurance, and mortgage systems.
Information security
fromSecuritymagazine
1 month ago

Understanding Breaches Before and After They Happen: What Every Organization Should Know

Most security breaches result from neglected fundamentals—human error, unpatched systems, weak authentication, and poor network segmentation—rather than advanced, novel exploits.
Information security
fromTheregister
2 months ago

BoE: UK finservs still lacking on basic cybersecurity

UK 2025 cybersecurity review finds financial firms and FMIs still lack basic safeguards: weak access controls, poor patching, misconfigurations, insufficient detection, and poor security culture.
fromSecuritymagazine
2 months ago

2026 Enterprise Security Trends: What Leaders Must Prepare For In An Interconnected Risk Landscape

Security in 2026 is defined by convergence, complexity, and scale. Enterprise organizations are navigating a world where cyber incidents are causing physical shutdowns, and physical breaches are creating digital vulnerabilities, all while cloud-dependent systems are becoming the backbone of operations, and AI is being used as a tool by both defenders and attackers. Incidents in 2025, especially the AWS outage, have painfully exposed just how interdependent modern security environments have become.
Information security
fromThe Hacker News
2 months ago

Securing the Mid-Market Across the Complete Threat Lifecycle

For mid-market organizations, cybersecurity is a constant balancing act. Proactive, preventative security measures are essential to protect an expanding attack surface. Combined with effective protection that blocks threats, they play a critical role in stopping cyberattacks before damage is done. The challenge is that many security tools add complexity and cost that most mid-market businesses can't absorb. With limited budgets and lean IT and security teams, organizations often focus on detection and response.
Information security
Information security
fromSecuritymagazine
2 months ago

How Banks Can Protect Their Most Valuable Asset: Customers

Banks must secure money, property, data, and reputation because incidents—crime, insider misuse, fraud, or IT failures—threaten safety, customer trust, regulatory standing, and brand.
Information security
fromThe Hacker News
2 months ago

3 Decisions CISOs Need to Make to Prevent Downtime Risk in 2026

Prioritize reducing dwell time with continuously refreshed, high-quality threat intelligence feeds to detect more threats and prevent costly operational downtime.
fromSecuritymagazine
1 month ago

Five Top Tips for Building a Strong Security Culture

Building security into the framework of an organization prevents security from being seen as a barrier to daily activities. If an employee feels as if a security measure is inhibiting them from completing their daily tasks, they're far more likely to find a way around that measure. This can range from propping open a door to using the same easy-to-remember password for every account.
Information security
Information security
fromTechzine Global
1 month ago

ISO 27001 inspires confidence, but it is only the beginning

ISO 27001 requires organizations to establish, implement, and continuously improve an ISMS to identify, assess, and mitigate information security risks, with external audits.
Information security
fromThe Hacker News
1 month ago

How Top CISOs Solve Burnout and Speed up MTTR without Extra Hiring

Providing sandbox-first, evidence-driven automation reduces MTTR, escalations, and burnout while preserving SLAs without hiring or stacking tools.
Information security
fromTheregister
2 months ago

AI framework flaws put enterprise clouds at risk of takeover

Two Chainlit vulnerabilities enable arbitrary file reads and SSRF attacks, risking exposure of environment variables, credentials, and potential cloud takeover if not patched.
[ Load more ]