Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What Are the Types of Audit Evidence?

The collection and evaluation of audit evidence plays an important role in assessing an organization’s compliance with established standards. The American Institute of Certified Public Accountants (AICPA) serves as a guiding force, establishing methods that auditors should use to carry out their duties effectively. As auditors start their examination, they first collect and analyze various types of audit evidence, each serving as a piece of the puzzle that forms the auditor’s report.

Cyber Security Awareness Platform

Welcome to CultureAI! We're here to help you upgrade to a data-driven, human risk management approach. This is not just about understanding security but creating an environment where employees actively prevent security incidents. Our cyber security awareness platform is trusted by organisations of all sizes. It brings to light employee security behaviour data, driving personalised security coaching, technical interventions, and security nudges.

New research reveals rapid remediation of MOVEit Transfer vulnerabilities

The recent discovery of a critical vulnerability in the MOVEit file transfer software is the latest driver in a series of high-profile software supply chain incidents. On May 31st 2023, Progress – the developer of MOVEit – published an advisory alerting the community to a critical vulnerability in its MOVEit Transfer product. The vulnerability, now tracked as CVE-2023-34362, allows an attacker to gain access to MOVEit’s database to steal and/or alter the contents.

Mitigating Risks for Forex Brokers

Managing risk is a paramount concern for Forex brokers. MetaTrader 4 and 5 platforms offer a robust suite of risk management tools that enable brokers to protect themselves and their clients from potential losses. In this article, we will explore the key risk management features and functionalities of MT4 and MT and discuss how brokers can effectively utilize them to mitigate risks and ensure a secure trading environment.

Diligent and Bitsight Partner to Increase Board Confidence in Cyber Risk Oversight

Today, Bitsight and Diligent launched an extension of our partnership focused on correlated, independent, and comparable cyber ratings from Bitsight within Diligent’s Board Reporting for IT Risk. Streamlined data collection and standardized dashboards enable CISOs to deliver clear and consistent insights to the board leveraging Bitsight and Diligent solutions.

Not all cybersecurity analytics are created equal: What CISOs should look for

Cybersecurity leaders are always working to make smarter investments to improve their programs. Not only do they look to reduce risk from the expanding attack surface and manage supply chain risk, they’re also juggling external pressures from regulators, insurers, and shareholders. As leaders look to technology solutions to help, many look at data analytics to reduce their organization’s risk, manage exposure, and improve overall program performance.

Exposure Management: Best Practices for Getting Ahead of Cyber Risk

As your organization's attack surface expands—spanning across the cloud, remote locations, and interconnected digital supply chains—the potential for cyber risk exposure grows. Implementing a proactive cybersecurity exposure management program can enhance your understanding of your organization's cyber risk posture and facilitate informed decision-making about how to best allocate investments and resources.

Thrilling True Stories of State-Sponsored Cyber Espionage

Ready for true stories of state-sponsored hackers and cyber espionage more riveting than any spy movie? Cue the James Bond theme song! Welcome, agents, to the global spy thriller unfolding right before our eyes. Join me in the enthralling world where politics and security intersect!

What is Open Source Intel? Definition, Tools, & Solutions

In the digital age, an organization’s cybersecurity posture is as strong as its intelligence. Open-source intelligence (OSINT) has emerged as a vital tool for businesses, non-profit organizations, and governments alike to fend off cyber threats. This guide offers a deep dive into the realm of OSINT, detailing its importance, applications, challenges, and how SecurityScorecard’s cybersecurity assessment platform empowers organizations to utilize it effectively.

4 Tips for Effective Cyber Vigilance as Your Attack Surface Expands

Cyberattacks are on the rise. In 2022, there was a 38 percent increase in global attacks compared to the previous year—and security teams are struggling to keep up. It now takes an average of 277 days for teams to identify and contain a breach. With so many alerts being received by the Security Operations Centers (SOCs) each day, how do teams decide which issues to address first?