Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How Data Integration Benefits Cyber Risk Exposure Management

The B2B landscape has seen a rapid shift towards digitalization, which makes cyber exposure management increasingly critical for companies in every sector and across all geographies. A pivotal aspect of managing cyber exposure is the ability to quantify the impact of cyber risks, which is traditionally a laborious task. This article describes how data integration is the key to unlocking quick and accurate cyber risk financial quantification.

4 Ways to Reduce Exposure and Manage Risk Across Your Expanding Digital Infrastructure

Digital infrastructure is the foundation of a modern, connected organization. It encompasses connectivity, cloud, compute, security, storage, applications, databases, IoT, remote networks, and more. Once housed on premises, this infrastructure now extends across regions, offices, work-from-anywhere environments—and across the third-party providers who make digital transformation possible. Securing this digital infrastructure is a growing challenge.

New vulnerability could lead to one of world's most powerful cyber attacks

The other week, Bitsight released a piece of high-profile research alerting the public to a high-severity vulnerability potentially allowing attackers to launch one of the most powerful Denial-of-Service (DoS) attacks in history. Here’s a summary of what happened and why it matters: Security leaders are asking “now what?” and Bitsight has answers.

10 Steps to Take Now to Reduce Supply Chain Risks

Open-source software has been a godsend for the development community. They bring lower development costs, faster application delivery, and greater flexibility; it’s no wonder nearly 90% of modern applications comprise third-party software nowadays. That’s not to say open-source software doesn’t come with its share of pitfalls, including security risks and vulnerabilities.

4 Signs of Incomplete Information Security Risk Management

In the realm of information security, risk management is often regarded as a vital component in safeguarding organizations against cyber threats. However, despite the efforts of security personnel and the existence of risk management systems, many organizations continue to encounter issues. It is crucial to acknowledge that the clunkiness of information security risk management – and the subsequent misunderstandings – can be major obstacles to achieving effective risk mitigation.

Minimizing public sector cybersecurity risk

The public sector is critical to national and international security. Yet, new research from SecurityScorecard and the Cyentia Institute found that 61.6% of public sector agencies have open cyber vulnerabilities, taking a median of 309 days to remediate. What’s more, 53% of public sector agencies are losing ground closing their cyber vulnerabilities, due in large part to a greater reliance on third-party vendors with less-than-optimal cybersecurity hygiene.

Cybersecurity Audit Checklist

Today’s corporate IT environments are complex and diverse. The security system to protect those environments can easily have hundreds of individual parts, and all of those parts need to be looked at individually and as a whole. To assure that all those parts are working as intended, you should perform a cybersecurity audit. Audits aren’t just good sense, either; many data privacy and security regulations require audits. That said, the steps for a cybersecurity audit can be long.

How to Automate Cyber Risk Quantification

The attack surface for most organizations is constantly expanding, and security teams struggle to decide which parts of that surface deserve priority for effective risk mitigation. Traditional methods of ranking risks such as malware and ransomware on a high-, medium-, low- scale have unraveled as different people interpret those categories differently. What’s needed: more accurate cyber risk assessments.

How to Identify and Mitigate Digital Transformation Risks

Market pressures and growth opportunities are accelerating digital transformation. According to Gartner, 89 percent of board directors say digital is embedded in all business growth strategies. Meanwhile 99 percent say that digital transformation has had a positive impact on profitability and performance (KPMG). The cloud, connected IoT devices, and remote work capabilities are the cornerstones of digital transformation.