Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How to Use a Maturity Model in Risk Management

A crucial part of building a robust and effective enterprise risk management (ERM) program is to perform a periodic review of your organization’s risk management activities. This assessment process is best accomplished using an established risk maturity model, an essential tool to plan and mitigate enterprise risk. A risk maturity model (RMM) is an assessment tool focused on your organization’s risk culture and risk management program.

What is Continuous Auditing?

Many security and compliance professionals hear the term “continuous monitoring” as part of their information security process, and have a good grasp of the term’s meaning – but “continuous auditing” may feel redundant or confusing. That’s unfortunate. Understanding how continuous auditing fits into a security-first approach to cybersecurity helps both to protect the integrity of your data and to prove the strength of your controls work.

How to Prioritize Risks in the External Attack Surface Effectively

In today’s interconnected world, organizations face numerous threats from external attackers aiming to exploit vulnerabilities in their systems. Understanding how to prioritize risks in the external attack surface is crucial for mitigating potential vulnerabilities and safeguarding sensitive data. In this comprehensive guide, we will delve into the key considerations and best practices to help you effectively prioritize and manage risks in your organization’s external attack surface.

Translating Risk to Your C-Suite: How To Get Executive Level Buy-In on Cybersecurity

The Chief Information Security Officer (CISO) is a relatively recent addition to the ranks of organizational leadership. It is a key role for businesses and organizations that possess the necessary resources and recognize the need for a robust security program. When leveraged properly, the CISO assumes a leadership position that is integral to an organization’s C-suite.

What Is Practitioner-Focused Cybersecurity?

A basic Google search for the term “cybersecurity” will turn up dozens of competing advertisements for companies promising to solve all your security woes and keep attackers at bay with their version of a “technology silver bullet” – the end all be all that you must, according to them, purchase right now. It’s not that technology isn’t essential to your security strategy; it’s vital!

Privacy Risk Management Across the Data Lifecycle

As a kid, keeping a secret meant not telling anyone else information that a friend chose to share with you and trusted you to protect. In the digital era, protecting customer and employee sensitive data works similarly. Although establishing privacy controls and maintaining data protection are more difficult when managing complex IT environments, the principles underlying your data protection initiatives remain the same.

What is the FFIEC Cybersecurity Assessment Tool?

The FFIEC Cybersecurity Assessment Tool (CAT) is a diagnostic test designed to help institutions identify risks and gauge cybersecurity preparedness. The tool is primarily for financial and non-depository institutions, enabling organizations to make risk-driven security decisions informed by regular cybersecurity assessments and standardized risk measurement criteria.

Android Malware Outbreak: Unmasking the RAT Inside a Screen Recording App

With the worldwide popularity of Android and its open-source software, hackers have an increased incentive and opportunity to orchestrate attacks. A Google search for “Android malware” brings up headlines like these, all from the past few days or weeks: SecurityScorecard recently analyzed a specific threat known as the AhMyth RAT (remote access trojan), which made headlines for infiltrating a popular screen recording app on the Google Play Store.

6 Benefits of Internal Auditing

Regular, comprehensive audits keep organizations on track. Audits come in all shapes and sizes, too: internal and external audits; audits of finance, audits of data, audits of operations. As a business owner, whether for a large enterprise or a small business, you want to assure that your stakeholders can trust your business operations and that your finances are in order. Internal audits are a great way to reinforce that trust and credibility.

5 Essential Elements of a Municipal Cyber Security Plan

Cyberattacks on state and local governments are on the rise. In 2020, more than 100 government agencies, including municipalities, were targeted with ransomware – an increasingly popular attack vector. Recently, average down time from cyber attacks on these targets is 7.3 days and results in an average loss of $64,645. These incidents are costly and disruptive. Most state cybersecurity budgets are a paltry 0% to 3% of their overall IT budget on average.