Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Penetration Tests of Newly Released Web Applications

Running penetration tests of a mature web application is always a great challenge. Systems are usually well hardened, and scanners fall short of flagging anything interesting, requiring an experienced security engineer to identify vulnerabilities using advanced exploitation methods. On the other side, some applications are going for their first release ever or release after a major code change.

Mitigating Cyber Threats With Continuous Monitoring

The supply chain for organizations has become increasingly susceptible to unplanned cybersecurity interruptions that negatively impact revenue, inventory, and consumer confidence. As a result, there has been an increasing focus on understanding how critical services are delivered, the reliance on third parties and fourth parties, and key risk controls that can be implemented to mitigate the risk of cyber security incidents.

Signs Your Cyber Loss Control Isn't Working

Most cyber insurance policies include a form of value-added service meant to help policyholders avoid cyber incidents. These services create differentiation in the market for insurers and help the bottom line. In fact, a recent survey of cyber insurers found that risk engineering services are a bigger driver of profitability than underwriting accuracy. Yet, we know that the dynamic nature of cyber risk has insurers struggling to keep up and new approaches to evaluating that risk are needed.

Themes, Insights, And Leadership Perspectives From The RSA Conference

SecurityScorecard joined U.S. cybersecurity leaders and the cybersecurity community at the 2022 RSA Conference in San Francisco, California from June 5-9. The RSA Conference is one of the world’s leading cybersecurity events, and SecurityScorecard was proud to join our community in-person at San Francisco’s Moscone Center.

Operational Risk Management: More Than Just Cybersecurity

In an ideal world, every organization would operate at peak capacity, have perfectly efficient operations, and never experience system failures, cyberattacks, or fraud. In the real world, however, it’s impossible to avoid such adverse events completely. Every organization faces problems due to weak business processes, system downtime, human error, and cybersecurity attacks. Businesses can, however, manage and mitigate the risks that lead to such events, to keep your business functional and viable.

Top 5 Risks Affecting the Healthcare Industry

Cybersecurity is a constant, serious threat to the healthcare industry. Unfortunately, however, the risks to cybersecurity and data security in healthcare are only one part of the larger risk management puzzle for healthcare organizations. Infections, alarm fatigue, telemedicine, and a lack of emergency preparedness also pose severe threats in healthcare. To minimize exposure, healthcare organizations require a comprehensive risk management program.

Reciprocity Wins Coveted Global InfoSec Awards during RSA Conference 2022

Last year was a record year for cybersecurity attacks, with the number of encrypted threats spiking by 167% (10.4 million attacks), ransomware attacks rising by 105% (623.3 million attacks), and intrusion attempts increasing by 11% (5.3 trillion).** Risk management is a fundamental principle of cybersecurity, which is why we are so excited to share that Reciprocity has won two Cyber Defense Global InfoSec Awards from Cyber Defense Magazine (CDM): the Hot Company – Risk Management award and the Cutti

The 1st 48 hours (after a cyber incident)

From small school districts and not-for-profit organizations with limited cyber defense budgets to major Fortune 500 companies with sophisticated cyber defense teams, understanding what to do in the first 48 hours following a significant cyber event is essential in protecting your organization and limiting the potential damage.

How Tagging Helps You Identify Risk Faster

One of the most critical factors to effective cybersecurity is time. The longer a vulnerability remains unaddressed, the more opportunity you give hackers to get into your system and wreak havoc. Think about it like this: imagine that you leave your laptop bag sitting on the passenger seat of your car. If you run into the store to get milk but forget to lock the door, the odds are that the laptop bag will still be there when you get back.