Risk Channel

Risk intelligence to lead, innovate & grow.

Want to get your daily slice of Risk knowledge to your inbox? Sign up now

Risk Channel helps you stay ahead of essential risk news shaping your profession. Every weekday, our unique blend of AI, risk experts and researchers monitor 100,000s of articles to share a summary of the most relevant and useful content to help you lead, innovate and grow.

From supply chain to regulatory enforcement, data privacy, GRC controls, whistleblowers, and risk management strategies. Risk Channel is the only trusted online news source dedicated to covering current headlines, articles, reports and interviews to make sure you’re at the forefront of changes in the risk industry.

HT banner
Recent Editions
rc-recent-na
Risk Channel
North America
Broadcom sues EU antitrust regulators

U.S. semiconductor firm Broadcom is suing EU antitrust regulators in Luxembourg-based General Court, Europe's second-highest, over their requests for documents containing legal advice from the company's U.S. lawyers in ​a case related to VMware, which it acquired in 2023. "This filing is a ​procedural action solely to protect Broadcom's rights under the long-recognized rules ​on legal professional privilege in non-EU countries, including the U.S.," ⁠said the company, adding: "As a U.S.-headquartered company with global operations, ​Broadcom regards legal professional privilege as a fundamental right that must be protected ​and our action is narrowly tailored to address only this interest." Broadcom said it is acting on a matter of principle and is otherwise cooperating with the European Commission's requests for information.

Full Issue
rc-recent-eu
Risk Channel
UK/Europe
AI data breaches are rising, report says

Verizon has said software flaws rather than stolen passwords have become the dominant entry point for hackers. In a review of more than 31,000 incidents in its annual Data Breach Investigations Report, Verizon found 31% started with vulnerability exploitation. The report said attackers are using AI to spot and exploit known vulnerabilities at machine speed, with the technology accelerating attacks from months to hours. Hackers are “demonstrably using GenAI to help at different stages of attack including targeting, initial access, and development of malware and other tools . . . AI’s primary impact is currently operational: automating and scaling techniques defenders already know how to detect, not yet unlocking these novel or rare attack surfaces.” Meanwhile, employees are not waiting for IT approval before adopting AI tools. Unapproved AI usage at work tripled from 15% to 45% of the workforce, making “shadow AI” the third most common source of non-malicious data leakage.

Full Issue
top-shadow
Read the latest Risk highlights