Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

4-Stage Vendor Risk Management Framework (2024 Edition)

A Vendor Risk Management framework is the skeleton of your VRM program. Without it, your Vendor Risk Management program will collapse under a heavy burden of inefficient processes. This post outlines the anatomy of an effective VRM framework to help you seamlessly manage security risks in your third-party network.

Must Have Features Your ASM Platform Must Have - Part 1

What is ASM, sometimes called EASM? A simple definition of External Attack Surface Management (ASM or EASM) is the process of defining and securing your organization from the outside-in. Your organization’s attack surface is made up of all the assets belonging to your organization, all of your vendor-managed assets, Cloud and SaaS assets, and all of their external third-party, fourth-party, and Nth-party connections that are visible to an outsider.

Implementing A Vendor Risk Assessment Process in 2024

A Vendor Risk Assessment (also referred to as a third-party risk assessment) is a critical component of a Vendor Risk Management program. As such, the overall impact of your VRM efforts hangs on the efficiency of your vendor risk assessment workflow. This post outlines a framework for implementing a streamlined vendor risk assessment process to prevent potential data breach-causing third-party security risks from falling through the cracks.

37 Arrested as Police Smash LabHost International Fraud Network

Police have successfully infiltrated and disrupted the fraud platform "LabHost", used by more than 2,000 criminals to defraud victims worldwide. A major international operation, led by the UK's Metropolitan Police, has seized control of LabHost, which has been helping cybercriminals create phishing websites since 2021 to steal sensitive information like passwords, email addresses, and bank details.

Supply Chain Cybersecurity - the importance of everyone

I’m always surprised – and a little disappointed – at how far we have to go before supply chain cybersecurity gets the respect and attention it deserves. I sat down this week with a new client who wanted some help addressing several internal issues surrounding their IT systems. When I asked them about their relationship with the supplier – essentially, how was their supply chain cybersecurity? - their response was not only worrying but, unfortunately, quite typical.

Azure Key Vault vs CyberArk: Comparison to Know

What comes to your mind when you think of a secret? To protect it in whichever manner you could, right? In the real-world scenario, it’s our nature and our self-control how we can manage our secrets and protect them but matter gets different when it comes to the virtual world. In the virtual world, a secret is anything that you aim to rigidly control access to, such as passwords, tokens, API & encryption keys, or certificates.

Malicious Insider Threats: How To Detect & Prevent Attacks

Data breaches and external threats are concerns for any security professional, but the most catastrophic security vulnerabilities often originate from malicious insider threats. This is not just an issue, it’s a pressing and immediate concern that demands our utmost attention. Here, we identify how to spot a malicious insider and provide proven strategies for preventing insider threats with technology-based solutions to protect your organization.