Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

A Guide to Handling the MOVEit Attack

Last week, a vulnerability in the popular MOVEit managed file transfer service was exploited by the CL0P ransomware gang to execute data breaches – an increasingly common cybersecurity attack technique where popular software is exploited to target, by extension, their users. Victims of this hack include British Airways, Boots, BBC, and multiple US government agencies.

5 Effective Strategies to Mitigate Market Risk

“Market risks” are risks specifically related to investments. These risks are defined by the behavior of the market overall, and can be caused by factors unrelated to your line of business. Really, any market fluctuations in any area might potentially affect your company’s investments. Market risk also refers to risks that are inherent to investments, in the sense that some amount of uncertainty will always be at play.

Cybersecurity Risk Assessment Tools You Can Use Year-Round

When it comes to improving cybersecurity at your organization, there are some fixes that you can undertake with very little preparation. More robust risk remediation efforts, however, usually start with a cybersecurity risk assessment. These assessments are commonly offered by third-party consultants, sometimes as a stand-alone service and sometimes as the first step in a larger end-to-end cybersecurity engagement.

Mend.io Launches AppSec Risk Assessment Program

At Mend.io, we’re always looking for ways to help organizations understand their application security risk. This week, we’re proud to announce a new initiative designed to make it easier than ever for organizations to visualize and remediate their biggest sources of risk: the Mend.io AppSec Risk Assessment Program.

5 Cyber Threat Prevention Strategies to Protect Your Growing Digital Footprint

Every cybersecurity leader is looking for best practices to prevent cyber threats and cyberattacks. Chief among them is a relentless focus on cyber hygiene—the practice of maintaining the cyber health of your digital infrastructure. Good cyber hygiene significantly lowers the chance of cyber incidents. Indeed, a Bitsight study found that poor cyber hygiene, as determined by an organization’s security rating, increases the risk of a ransomware attack by 4.6 times.

Data Privacy Lessons from Meta's $1.3 Billion GDPR Fine (& James Bond)

Many of you have probably heard about the record $1.3 billion GDPR fine the European Union (EU) issued against Facebook’s parent company, Meta, for unlawful data transfers of EU citizens.1 In reading the coverage and ruling, I kept thinking about how high-stakes data privacy has become today and how data has surpassed oil as the world’s most valuable resource.

How to Choose a Compliance Management Tool

Effective corporate compliance is an increasingly urgent issue for businesses. More regulations continue to proliferate across the landscape, and compliance obligations are becoming more complex. The need for an effective compliance management tool to help CISOs and senior management meet those ever-expanding compliance requirements has never been greater. A manual approach to tracking and monitoring compliance activities drives up costs and is more prone to error.

IT Audit Checklist for Your IT Department

A disruption to your company’s information technology (IT) systems can disrupt your business operations as well, costing you time and money while employees wait for repairs. An audit of your IT systems can identify and fix those potential disruptions before they happen – and an IT audit checklist can assure that your IT department has the necessary resources in place to keep your systems safe.

Risk Registers: The Ultimate Guide with Examples & Template

Effectively utilizing a risk register allows your organization to anticipate and overcome challenges with confidence. No GRC program is failproof, which is why it’s so critical to take a thorough look at potential risks and remediations. To make sure you’re starting on the right foot, we’ve provided a free, downloadable risk register template you can use once you have a better understanding of what it does.