Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The SEC, the SolarWinds Complaint, and the Lack of Transparency

‍ The US Securities and Exchange Commission's complaint against SolarWinds and its Chief Information Security Officer (CISO) Tim Brown has sent shockwaves through the cybersecurity community. Solarwinds and Brown have been accused of fraud, the details of which can be found in an extensive 68-page document. ‍ This complaint, in itself a bold move, has been particularly jolting to cyber professionals given the SEC’s July 2023 regulations.

90% of Energy Companies Experienced a Third-Party Breach

More than two years after the major U.S. pipeline ransomware incident, the SecurityScorecard Threat Research, Intelligence, Knowledge, and Engagement (STRIKE) Team has released a new report revealing that 90% of the largest global energy companies have experienced a third-party breach in the past 12 months. This research highlights the uphill battle faced by the energy industry in combating emerging threats across the supply chain.

Third-Party Data Breach Response Playbook

The risk of data breaches has become an omnipresent concern for businesses and organizations. And as technology continues to evolve, so do the tactics of cybercriminals. One critical aspect of cybersecurity strategy involves preparing for and responding to third-party data breaches. A well-constructed response playbook is indispensable in mitigating the potential damages and ensuring a swift recovery.

Building a Resilient Third-Party Risk Management Program

In an era where businesses are increasingly reliant on third-party vendors for essential services, the significance of a resilient third-party risk management program cannot be overstated. Third-party partnerships can expose organizations to various risks, especially in the domain of cybersecurity. This guide aims to help businesses in building a robust third-party risk management program that is adaptable to the ever-evolving landscape of cyber threats and dynamic business needs.

From Reactive to Proactive: Transforming Your Approach with Threat Intelligence

The landscape of cybersecurity is ever-evolving, and staying one step ahead of cyber threats has become imperative for organizations. Traditionally, many businesses have adopted a reactive approach to cybersecurity, responding to threats and breaches as they occur. However, this approach is no longer sufficient in today’s digital world. Shifting to a proactive stance, powered by threat intelligence, is crucial for enhancing an organization’s security posture.

The Role of Threat Intelligence in Proactive Cybersecurity

In the rapidly evolving digital landscape, the approach to cybersecurity has shifted significantly. Proactive cybersecurity has become a necessity rather than a choice, with threat intelligence playing a pivotal role in this paradigm shift. This post explores how threat intelligence forms the cornerstone of a proactive cybersecurity strategy, focusing on its role in predicting and preventing cyber attacks, thereby enhancing an organization’s security posture.

Data Breach at the Idaho National Laboratory

On November 20, the Idaho National Laboratory (INL) confirmed that it had suffered a data breach. The confirmation followed the SiegedSec threat actor group’s circulation of claims that it had “accessed hundreds of thousands of user, employee and citizen data” on social media and hacking forums.

Research Into IoCs Linked to Exploitation of CVE-2023-47246

The SecurityScorecard Threat Research, Intelligence, Knowledge, and Engagement (STRIKE) Team has conducted further research into the indicators of compromise (IoCs) that SysAid shared when disclosing a new vulnerability in its on-premise software last month.

Integrating Threat Intelligence into Your Cybersecurity Plan

In the rapidly evolving digital landscape, the importance of a well-constructed cybersecurity plan cannot be overstated. However, the effectiveness of any cybersecurity strategy significantly depends on how well it integrates threat intelligence. Threat intelligence involves understanding, analyzing, and using knowledge about existing and potential cyber threats to make informed security decisions.

Introducing Bitsight Portfolio Risk Analytics

Do you know what percentage of your vendors are at higher risk of ransomware attack? Can you drill-in to see exactly who? Or more importantly, why? Or how effective your vendor program has been in reducing risk to the business over the last 12 months? In the ever-connected world of partners and suppliers, vendors and even more vendors, the line between ‘their risk’ and ‘your risk’ disappeared. And what security and compliance teams need more of is not more data, but insights.