Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

5 Steps to Selecting a Vendor Risk Management Framework

Third parties are an inevitable and essential part of your business ecosystem. They’re your vendors, partners, and contractors. They improve efficiency, extend your reach, and make it possible to deliver the best possible products and services. From a security perspective, however, they also bring a significant amount of risk. Misconfigurations of a third-party’s cloud can lead to supply chain data breach risks.

What Is FedRAMP Compliance?

The Federal Risk and Authorization Management Program (FedRAMP) is a program run by the U.S. federal government to help cloud service providers bid on government contracts. Simply put, FedRAMP helps such providers achieve minimum standards of cybersecurity, so they can sell their cloud service offerings to federal government agencies more efficiently. All cloud service providers (CSPs) must achieve FedRAMP authorization to be able to contract with federal agencies.

What's the Difference Between Penetration Testing vs Vulnerability Scanning?

Penetration testing and vulnerability scanning are both important practices that protect the network of a business. However, the two are very different from each other in the way they test the security and vulnerabilities of a network. Keep reading to learn more about the differences and how to decide whether one or both would best suit your needs.

Making the Shift From Vendor Risk Management to Third-Party Risk Management (and Leaving Your Questionnaires Behind!)

There’s an old expression that says the most dangerous statement a person can make is “we’ve always done it this way.” I think we can all agree that we need to grow and adapt as the world around us changes. That’s why over the past few months, we’ve shown you ways to switch to a risk-first approach and align your risk and compliance activities to your business objectives.

Guide to Implementing an IT Risk Management Framework

Enterprise risk management (ERM) is a disciplined, holistic way to identify, manage, and mitigate risk throughout your entire enterprise. IT risk management (ITRM) is one subset of that effort, focused on identifying and managing risks specific to IT functions. An industry-accepted ITRM framework can help you implement an ITRM program quickly and with minimal disruption.

What is Data Exfiltration and How Can You Prevent It?

Every day, cybercriminals are seeking new techniques to extract data and infiltrate networks; one of these techniques is data exfiltration. To prevent these kinds of cyber threats, we must learn how data exfiltration works, the methods used to execute attacks, and how companies can secure their network from further data breaches. Let’s take a closer look.

What is Mobile Forensics? A Real Example From the SecurityScorecard Forensics Lab

Mobile forensics is recovering digital evidence from mobile devices using accepted methods. A lot of information can be discovered by analyzing a criminal’s phone. That’s why mobile forensics and digital forensics as a whole are becoming valuable assets for law enforcement and intelligence agencies worldwide. In 2021, there were 15 billion operating mobile devices worldwide. That’s nearly two per person. The amount of data stored across these devices is astounding.

8 Best Practices for Securing the Internet of Things (IoT)

While the Internet of Things (IoT) can provide helpful insights, it can also introduce a host of new security vulnerabilities into your organization. Without a clear understanding of the importance of IoT security, your organization will continue to introduce new vulnerabilities without even realizing it. Let’s take a closer look at how IoT security is important and the best practices your organization can use to improve the overall security of your organization.