#enterprise-risks

[ follow ]
#cybersecurity
EU data protection
fromSecurityWeek
22 hours ago

European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack

Hackers stole over 300GB of data from the European Commission's AWS environment using a compromised API key from the Trivy supply chain attack.
EU data protection
fromSecurityWeek
22 hours ago

European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack

Hackers stole over 300GB of data from the European Commission's AWS environment using a compromised API key from the Trivy supply chain attack.
Psychology
fromSilicon Canals
1 day ago

The people who always have a backup plan aren't pessimists. They grew up in environments where promises were unreliable, and redundancy became the only architecture that didn't collapse when someone changed their mind without warning. - Silicon Canals

Obsessive planners are often generous, driven by past experiences that teach them to prepare for uncertainties.
Careers
fromwww.businessinsider.com
21 hours ago

No mediocre worker is safe the bar for keeping your job just went up

Companies are replacing underperforming employees with better talent due to constrained hiring budgets and a focus on maximizing performance.
Online learning
fromeLearning Industry
19 hours ago

Continuous Learning Cultures: What High Performing Organizations Do Differently

Organizations must adopt a continuous learning culture to keep pace with rapid changes in technology and evolving job roles.
Healthcare
fromFast Company
1 day ago

Dignity as a competitive business model

Healthcare affordability is forcing families to delay care, highlighting the need for dignity-centered care models that prioritize patient respect and community health.
#ai-governance
fromComputerWeekly.com
3 days ago
EU data protection

AI-driven identity must exist in a robust compliance framework | Computer Weekly

Governance must precede AI adoption to avoid compliance failures and ethical risks in identity verification systems.
#leadership
fromEntrepreneur
3 days ago
Bootstrapping

Your Management Strategy Is Doomed to Fail If You Don't Do This

Effective management focuses on execution through a straightforward approach: face reality, investigate issues, fix them systematically, and own the outcomes.
Productivity
fromEntrepreneur
5 days ago

How Senior Leaders Make Fewer, Better Decisions

Senior leaders must make high-impact decisions with less visibility by treating decision-making as a discipline and designing supportive systems.
Bootstrapping
fromEntrepreneur
3 days ago

Your Management Strategy Is Doomed to Fail If You Don't Do This

Effective management focuses on execution through a straightforward approach: face reality, investigate issues, fix them systematically, and own the outcomes.
Productivity
fromEntrepreneur
5 days ago

How Senior Leaders Make Fewer, Better Decisions

Senior leaders must make high-impact decisions with less visibility by treating decision-making as a discipline and designing supportive systems.
Cryptocurrency
fromnews.bitcoin.com
21 hours ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
Remote teams
fromInfoQ
3 days ago

How to Handle Trusts and Psychological Safety When Scaling Organizations

Trust must be built team by team; it cannot be replicated as organizations scale.
Startup companies
fromEntrepreneur
1 day ago

This Business Model Is the Hidden Goldmine For Boosting Profits

Done-For-You business models are surging as entrepreneurs seek results without managing every task themselves.
DevOps
fromInfoWorld
1 day ago

Understanding the risks of OpenClaw

OpenClaw is an orchestration layer that requires external services to function effectively, rather than being a standalone cloud platform.
#data-breach
Privacy professionals
fromSilicon Canals
1 day ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Information security
fromTheregister
3 days ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
Privacy professionals
fromSilicon Canals
1 day ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Information security
fromTheregister
3 days ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
Productivity
fromEntrepreneur
2 days ago

Why Leaders Often Discover Organizational Problems Too Late

Hidden problems in teams often remain unreported due to a culture that discourages early issue escalation, leading to delayed responses and increased costs.
Business
fromFast Company
2 days ago

Your CEO gives you the ick. Now what?

Emily's perception of her CEO's integrity is compromised after discovering his affair, affecting her confidence in promoting company values.
Fundraising
fromFast Company
1 day ago

How giving starts progress and leadership scales it

Volatility and accountability are transforming philanthropy, requiring leadership to drive impactful change.
#reputation-management
fromEntrepreneur
5 days ago
Social media marketing

Not All PR Fires Burn the Same - Here's How to Put Them Out

Reputation management during a crisis requires digital intervention and a well-crafted media response to effectively control the narrative.
Social media marketing
fromEntrepreneur
5 days ago

Not All PR Fires Burn the Same - Here's How to Put Them Out

Reputation management during a crisis requires digital intervention and a well-crafted media response to effectively control the narrative.
Marketing
fromFast Company
2 days ago

Beyond earned media: A new PR playbook

A strong PR plan balances daily visibility with long-term brand building, adapting to evolving media landscapes and consumer habits.
US Elections
fromFortune
2 days ago

Prediction markets have sparked a golden age of insider trading-but the party may be coming to an end | Fortune

Insider trading in prediction markets has surged, raising concerns about unethical betting practices and lack of regulatory oversight.
Python
fromThe Hacker News
2 days ago

The State of Trusted Open Source Report

AI is reshaping software development and security, influencing container image usage and vulnerability management.
#artificial-intelligence
Data science
fromComputerworld
2 days ago

AI project 'failure' has little to do with AI

The reliability of genAI is compromised by various factors, necessitating independent verification of its outputs.
Law
fromEntrepreneur
1 week ago

The Workplace Liability Too Many Leaders Ignore

Slip-and-fall accidents can lead to significant legal, financial, and operational challenges for businesses.
Bootstrapping
fromEntrepreneur
1 day ago

How to Build Financial Resilience as a Solopreneur

Designing a delivery model and client journey is crucial for business stability and avoiding the feast or famine cycle.
Podcast
fromSecuritymagazine
1 week ago

What Does It Take to Be an Outstanding CSO or CISO?

Outstanding security leaders often come from non-traditional backgrounds, with 40% of recent CSO-CISO Hall of Fame honorees starting in the private sector.
Careers
fromFast Company
3 days ago

Why the best employees often carry the heaviest burden

The capability curse leads to increased expectations and reliance on capable individuals, often resulting in a heavier burden for them over time.
fromwww.businessinsider.com
3 days ago

I was laid off twice from the same company. The second time was a gut punch but taught me not to take cuts personally.

When the CEO held a virtual town hall in 2020 and said there needed to be layoffs, I knew I would be one of the first to go because I served zero purpose at that point.
Marketing
DevOps
fromInfoQ
4 days ago

Event-Driven Patterns for Cloud-Native Banking: Lessons from What Works and What Hurts

Event-driven architecture introduces complexity and requires careful implementation, especially in regulated environments, to ensure reliability and system evolution.
Philosophy
fromTheregister
1 week ago

Calling out corporate BS? There's a steaming pile to aim for

Corporate jargon impresses those least equipped for analytical thinking, confirming biases while also serving essential functions in specific contexts.
Bootstrapping
fromEntrepreneur
1 day ago

Clear Job Responsibilities Helps You Grow Faster - Here's How

Deliberate governance design is essential as companies grow to avoid confusion and inefficiency.
Artificial intelligence
fromInfoWorld
1 day ago

Google gives enterprises new controls to manage AI inference costs and reliability

Gemini API introduces Flex and Priority tiers for managing AI inference workloads based on criticality and cost.
Business
fromFortune
3 days ago

In the age of AI anxiety, the 100 Best Companies to Work For are betting on their people | Fortune

Employee feedback is crucial for leadership effectiveness and companies must adapt to new priorities in the AI era.
Agile
fromEntrepreneur
2 weeks ago

What Every CEO Should Do When a Customer Claims Your Business Caused Harm

Businesses need a clear, repeatable playbook for handling serious complaints to prevent chaos and control outcomes during critical moments.
Careers
fromEntrepreneur
5 days ago

Your Team Doesn't Need a 'Work Family' - It Needs This System That Holds Up When It Counts

Teams struggle with clarity, not effort; accountability erodes when support blurs lines between family and business.
Healthcare
fromEntrepreneur
2 weeks ago

Why Liability Insurance No Longer Works the Way You Think - and What CEOs Must Do About It

Liability insurance has shifted to a shareholder-driven system, requiring leaders to manage claims proactively to avoid costly surprises.
#ai
Artificial intelligence
fromSecurityWeek
5 days ago

Silent Drift: How LLMs Are Quietly Breaking Organizational Access Control

AI assistance in policy as code can introduce serious flaws, leading to incorrect access permissions despite syntactically valid policies.
Artificial intelligence
fromSecurityWeek
5 days ago

Silent Drift: How LLMs Are Quietly Breaking Organizational Access Control

AI assistance in policy as code can introduce serious flaws, leading to incorrect access permissions despite syntactically valid policies.
Bootstrapping
fromEntrepreneur
2 days ago

How to Treat Your Successes Like Renewable Resources

Success can create pressure and lead to misaligned goals for entrepreneurs, making them feel obligated rather than fulfilled.
fromTechCrunch
3 days ago

Hasbro says it was hacked, and may take 'several weeks' to recover | TechCrunch

Hasbro detected an intrusion on March 28, prompting the company to take down some of its systems. Parts of Hasbro's website appeared down, with error messages indicating maintenance.
Privacy professionals
Information security
fromSecurityWeek
1 day ago

Mobile Attack Surface Expands as Enterprises Lose Control

Mobile device security is inadequate, with many organizations using critically outdated operating systems and exposing sensitive data to potential attacks.
Careers
fromFast Company
5 days ago

Toxic bosses don't just hurt people. They hurt the bottom line

Toxic bosses significantly harm organizational culture, employee well-being, and financial performance, making them a critical issue for leaders to address.
Information security
fromTNW | Insights
18 hours ago

KeeperDB brings zero-trust database access to privileged access management

Database credentials are a major attack vector, and KeeperDB integrates access controls into its PAM platform to enhance security.
Information security
fromInfoWorld
2 days ago

Claude Code leak puts enterprise trust at risk as security, governance concerns mount

Leaks threaten Anthropic's market position and raise security concerns about its AI coding tools.
Artificial intelligence
fromMedium
5 days ago

When Not to Use AI: Strategic Restraint as a Leadership Skill

Leaders must prioritize responsible AI adoption, focusing on strategic deployment rather than indiscriminate implementation to avoid pitfalls.
Privacy professionals
fromMedCity News
2 weeks ago

The Evolving Landscape of Privacy and Cybersecurity: Essential Strategies for Legal and Compliance Professionals - MedCity News

Organizations must combine strong controls with comprehensive employee training and accountability culture to effectively protect sensitive data and comply with evolving privacy laws.
fromComputerworld
1 day ago

A core infrastructure engineer pleads guilty to federal charges in insider attack

Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities.
Information security
Information security
fromInfoWorld
1 day ago

CERT-EU blames Trivy supply chain attack for Europa.eu data breach

TeamPCP exploited Trivy to access sensitive cloud credentials and data, creating significant vulnerabilities for organizations.
Privacy professionals
fromwww.housingwire.com
2 weeks ago

Reducing risk: Why logging, protection, and review matter

Application logs are critical cybersecurity safeguards that provide visibility into system behavior, enabling early detection of security threats and operational issues in real estate and mortgage lending organizations.
Information security
fromInfoQ
2 days ago

Open Source Security Tool Trivy Hit by Supply Chain Attack, Prompting Urgent Industry Response

A malicious release of the Trivy vulnerability scanner exposed critical weaknesses in software supply chain security, allowing for potential credential theft.
Business
fromLondon Business News | Londonlovesbusiness.com
3 weeks ago

Why UK businesses are taking physical security more seriously - London Business News | Londonlovesbusiness.com

UK businesses are shifting physical security from a background facilities concern to a central risk management priority as operational complexity and vulnerabilities increase.
Artificial intelligence
fromFortune
1 week ago

One prediction isn't enough - Why CEOs are shifting to wartime planning | Fortune

Scenario planning is essential for CEOs to prepare for unpredictable events and ensure rapid response to multiple potential futures.
Business intelligence
fromLondon Business News | Londonlovesbusiness.com
1 month ago

Why UK business leaders turn to corporate intelligence to mitigate hidden risks - London Business News | Londonlovesbusiness.com

UK business leaders increasingly rely on corporate intelligence to navigate geopolitical risks, supply chain vulnerabilities, cybersecurity threats, and regulatory pressures that traditional governance tools cannot adequately address.
Information security
fromWIRED
1 day ago

Meta Pauses Work With Mercor After Data Breach Puts AI Industry Secrets at Risk

Meta has paused work with Mercor due to a major security breach affecting data used for AI training.
Marketing
fromInc
1 month ago

CEOs Who Stay Silent Are Losing Trust-and Business

Trust now depends on leaders openly sharing their thinking rather than polished corporate messaging, as AI-generated content has commoditized traditional branding approaches.
Information security
fromTechzine Global
2 days ago

Axios supply chain attack victim posts postmortem to prevent a repeat

Axios was compromised for three hours, distributing Remote Access Trojans due to a sophisticated social engineering attack by North Korean group UNC1069.
Law
fromBusiness Matters
1 month ago

How Unexpected Workplace Incidents Can Disrupt Business Continuity

Unexpected workplace incidents can quickly disrupt operations, creating legal liability, staffing strain, lost momentum, and eroded trust for small and mid-sized businesses.
Information security
fromSecuritymagazine
4 days ago

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Companies are increasingly investing in executive protection due to rising threats, making it a strategic necessity for business continuity and resilience.
Information security
fromFortune
2 days ago

Mercor, a $10 billion AI startup, confirms it was caught up in a major security incident | Fortune

Mercor confirmed a security breach linked to a supply chain attack that may have exposed sensitive data of its customers.
Information security
fromThe Hacker News
2 days ago

Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise

Cisco has released critical updates to address vulnerabilities in its Integrated Management Controller and Smart Software Manager On-Prem.
#supply-chain-attack
#immigration-enforcement
Information security
fromSecurityWeek
4 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
Information security
fromComputerWeekly.com
4 days ago

Banning routers won't fix what's already broken | Computer Weekly

The FCC's ban on foreign-made routers addresses future procurement, not current security risks, as routers are already vulnerable and widely deployed.
Information security
fromZDNET
1 week ago

1 in 2 security leaders say they're not ready for AI attacks - 4 actions to take now

AI-powered cybercrime is a significant and growing threat to businesses, with many feeling unprotected.
fromFortune
2 months ago

As risk skyrockets, current and former CFOs are in demand for audit committees | Fortune

As audit committees confront a rapidly expanding risk landscape, their role in corporate governance is being reshaped. Boards have often turned to current and former CFOs as independent directors, particularly for audit committees, because of their ability to translate complex operational and financial realities into effective oversight.For example, this month, J. Michael Hansen, former EVP and CFO of Cintas Corporation, was appointed to the audit committee at Paychex.
Business
Business
fromHarvard Business Review
2 months ago

Where to Look for Ethical Risk Inside a Company

Unchecked integrity gaps—overlooked conflicts of interest, offensive behavior, or aggressive sales practices—can escalate into severe reputational and financial harm.
Information security
fromThe Hacker News
3 weeks ago

What Boards Must Demand in the Age of AI-Automated Exploitation

AI-powered exploitation has eliminated the time constraints that previously made large vulnerability backlogs survivable, forcing organizations to immediately address security gaps or face rapid compromise.
Business
fromHarvard Business Review
1 month ago

The Benefits-and Challenges-of an Insider CEO

Promoting seasoned insiders to CEO typically yields stronger leadership due to superior understanding of the organization's culture, strategy, and stakeholders.
fromSecurityWeek
1 month ago

Four Risks Boards Cannot Treat as Background Noise

Rather than stolen data making headlines, it was business stoppage that triggered attention. Moving into 2026, the board's focus should be on ensuring business continuity and building resilience in the face of emerging risks generated by AI usage and attack vectors, quantum computing and geopolitics.
Information security
Information security
fromThe Hacker News
1 month ago

Top 5 Ways Broken Triage Increases Business Risk Instead of Reducing It

Triage failures occur when decisions are made without execution evidence, causing false positives, missed threats, and higher costs; interactive sandboxes enable evidence-backed verdicts within seconds.
Information security
fromTechzine Global
2 months ago

From vulnerability whack-a-mole to strategic risk operations

Shift security from counting vulnerabilities to strategic risk operations that prioritize exposure, value at risk, and measurable business outcomes.
fromSecuritymagazine
1 month ago

Five Top Tips for Building a Strong Security Culture

Building security into the framework of an organization prevents security from being seen as a barrier to daily activities. If an employee feels as if a security measure is inhibiting them from completing their daily tasks, they're far more likely to find a way around that measure. This can range from propping open a door to using the same easy-to-remember password for every account.
Information security
[ Load more ]