Thank you for subscribing!

You've successfully signed up for our weekly newsletter.

More from Today's Risk Manager

Phishing Scam Exploits Google Calendar to Bypass Security Filters

Phishing Scam Exploits Google Calendar to Bypass Security Filters

A new phishing scam exploits Google Calendar invites and Google Drawings to steal credentials, bypassing filters. Learn how attackers deceive & how to stay protected.

The Rising Risk and Cost of Data Breaches

The Rising Risk and Cost of Data Breaches

The cost of data breaches hit $4.88M in 2024. Learn how evolving cyber threats exploit identity, tech flaws, and human error—and what it means for your organization.

Understanding and Mitigating Supply Chain Risk: A Growing Cybersecurity Challenge

Understanding and Mitigating Supply Chain Risk: A Growing Cybersecurity Challenge

Discover how rising cyberattacks highlight the critical need for robust supply chain risk management to protect against vulnerabilities and safeguard your business.

Federal Cybersecurity Modernization Plan Targets Energy Sector Challenges

Federal Cybersecurity Modernization Plan Targets Energy Sector Challenges

Explore how the new federal cybersecurity modernization plan addresses the risks of a digitized energy grid with proactive measures and multi-agency collaboration.

Preparing for Enforcement of the 2024 HIPAA Amendments on Reproductive Health

Preparing for Enforcement of the 2024 HIPAA Amendments on Reproductive Health

Read about the HIPAA rules on reproductive health PHI taking effect 12/23/24, bringing stricter privacy protections and compliance challenges for covered entities and associates.

Election-Driven Regulatory Shifts: Building Risk and Compliance Strategies for 2025

Election-Driven Regulatory Shifts: Building Risk and Compliance Strategies for 2025

Prepare for 2025’s regulatory shifts: From AI to ESG, tariffs, and sanctions, evolving laws demand proactive compliance to navigate global and US enforcement changes.

Scroll to Top