Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The key to 21 CFR Part 11 Compliance

21 CFR Part 11 is a set of regulations issued by the U.S. Food and Drug Administration (FDA) that establishes the criteria under which electronic records and signatures are considered trustworthy, reliable, and equivalent to paper records. In order to sell products in the United States, companies must demonstrate that their systems meet the standards set forth in Part 11. This can be a daunting task, as the requirements are numerous and detailed.

Improve your risk posture: Introducing Risk Management customization

Today we’re excited to announce Risk Management customization, a collection of new capabilities in our platform that enhance the existing Risk Management solution and give you more flexibility to enable custom risk management scoring and prioritization. Currently in beta, Risk Management customization will be generally available in the coming months. ‍ ‍

How to Create a Vendor Risk Management Checklist

Vendor risk management is top of everyone’s mind considering recent headline grabbing supply chain attacks, such as SolarWinds. But as more vendors enter your digital supply chain, keeping up with vendor adoption is tough. According to Accenture, 79 percent of businesses are adopting technologies faster than they can address related security issues. For your organization to be truly protected against supply chain cyber risks, you must develop a robust vendor risk management (VRM) program.

Evidence-Based Strategies to Lower Your Risk of Becoming a Ransomware Victim

The ransomware trend continues to run rampant. One in four breaches involve ransomware, and organized crime actors use ransomware in more than 62 percent of incidents. Cyber criminals are taking advantage of these new opportunities to exploit a greatly expanded attack surface: But ransomware is only one small piece that a security leaders has to manage. The threat of ransomware is compounded by a distributed workforce, trends toward technology consolidation, geopolitical upheaval, and budget constraints.

Managing Cyber Risk in the Insurance Supply Chain

This week in London, SecurityScorecard hosted a roundtable discussion on cyber risk in the insurance supply chain. Keynote speaker Santosh Pandit, head of Cybersecurity at the Bank of England, shared his insights with 20 London-based insurers on managing cyber risk in the financial sector and the latest regulatory initiatives that may impact the insurance industry.

SecurityScorecard Identifies Infrastructure Linked to Widespread MOVEit Vulnerability Exploitation

New disclosures regarding the widespread exploitation of CVE-2023-34362, a new vulnerability affecting the MOVEit file transfer software, and the Cl0p ransomware group’s claim of responsibility for its widespread exploitation and the resulting data theft, have continued in the weeks since the vulnerability’s original publication.

3 Steps to Bridge Cyber Risk Communication Gaps

Effective communication is at the heart of any successful organization. It ensures that information is clearly conveyed, understood and acted on. But sometimes, despite our best intentions, there can be a gap between what we say and what the other person hears. The result? Confusion, misunderstandings and missed opportunities. When it comes to talking about cyber risk, you can bridge this communication gap by translating technical, information security data into the language of business impact.

Debunking the Misconception That CRQ Requires a Lot of Data Collection

Cyber risk quantification (CRQ) can be an invaluable tool. The ability to put a number to cyber risk aids in communicating with board members, planning strategic investments, calculating the return on investment of cybersecurity spending, and right-sizing cybersecurity insurance coverage. However, many organizations avoid taking advantage of CRQ due to some common misconceptions.