Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

A Vendor Risk Assessment Questionnaire Template

Digital relationships with third-party vendors increase opportunities for growth, but they also increase opportunities for cyberattacks — a recent study found that 61% of U.S. companies said they have experienced a data breach caused by one of their vendors or third parties (up 12% since 2016). Implementing a vendor risk management strategy aligned with frameworks like the NIST security framework can help mitigate these risks.

10 tips for Small Business Cyber Security in 2024

As we move further into 2024, the cyber threat landscape continues to evolve, presenting new challenges and opportunities for small businesses. At Obrela, we understand the importance of staying ahead of these threats and securing your digital assets. Here are some cyber security tips for small businesses to help your enterprise to enhance its cybersecurity measures this year and stay ahead of cyber criminals.

How Brokers Harness Artificial Intelligence for Market Analysis

The integration of artificial intelligence (AI) in the finance sector has seen a dramatic surge over the past decade. Key technological advancements like increased computing power, improved algorithms, and the availability of big data have paved the way for AI to transform brokerage operations.

Threat, Vulnerability, and Risk: What's the Difference?

Threat, vulnerability, and risk – these words often appear side by side in security discussions. But what exactly do they mean, and how do they differ from one another? This article discusses the relationships among threats, vulnerabilities, and risk. Then we’ll explore various methods for calculating and managing these issues, and provide insights into securing against potential security threats.

Cost, convenience, and compliance: The value for insurers of the Forrester Total Economic Impact Study

The growing sophistication of threat actors, supply chain disruptions, and the potential for systemic and catastrophic losses make for a precarious landscape for insurers and those seeking insurance. To help customers reduce risk at scale, insurers and brokers must adopt technology in order to visualize vulnerabilities while also forecasting, quantifying, and monitoring risks.

Building a Robust Vendor Risk Management Dashboard

In today’s interconnected business landscape, outsourcing to third-party vendors and service providers is an effective method for most organizations to improve operational efficiency and lower financial costs. However, as businesses form third-party partnerships, they inherit potential risks and increase the complexity of their third-party ecosystem, as any one vendor can become an attack vector that cybercriminals exploit to pursue a data breach.

Stop your employees from sharing credentials

Need help with a task while you’re out of the office? Sharing your login details with a colleague can seem harmless. However, this seemingly innocent act can lead to unintended consequences, especially if you’re using the same credentials across multiple platforms. Imagine the implications if those shared credentials grant access to your company's network. That's why it's crucial to prioritise security over convenience, and prevent password sharing.

SecurityScorecard Reduced External Third-Party Breaches by 75%

The interconnected nature of our digital economy requires a shift in how companies think about their cyber risk. Companies need to consider the broader system and how to build mutual support with their entire cyber ecosystem– customers, partners, and vendors. Yet, today, most companies still rely on manual vendor onboarding, monitoring, and point-in-time external security reports to manage supply chain cyber risk – even top Fortune 500 companies.

How to Address Kubernetes Risks and Vulnerabilities Head-on

Misconfigurations and container image vulnerabilities are major causes of Kubernetes threats and risks. According to Gartner, more than 90% of global organizations will be running containerized applications in production by 2027. This is a significant increase from fewer than 40% in 2021. As container adoption soars, Kubernetes remains the dominant container orchestration platform.

How PE Firm CFOs Can More Economically Manage Cyber Risks

‍ ‍ ‍Private equity (PE) firms are becoming increasingly attractive targets for cybercriminals. Malicious actors are keen to capitalize on the ecosystem's access to an incredibly extensive and diverse array of sensitive data, particularly susceptible during and after M&As, as well as the notoriously low cybersecurity measures in place among the smaller businesses that some PE firms chose to hold.