Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How to Measure and Communicate Cybersecurity Progress

Last week, SecurityScorecard was invited to participate in a fireside chat with Michael Daniel, President & CEO of the Cyber Threat Alliance (CTA). SecurityScorecard’s Chief Business Officer, Sachin Bansal, joined Daniel for a lively discussion regarding how to measure cyber health and clearly communicate progress against those metrics.

Globee Disruptor Awards names Forward Enterprise 2023 Silver Winner

The Globee Awards for Disruptors recognizes and celebrates organizations and individuals who have significantly contributed to disruptive innovation across various industries. These awards acknowledge the trailblazers who have challenged the status quo, introduced groundbreaking ideas, and transformed traditional practices through their disruptive approaches.

Fortifying data security: 5 features your data store must have

In an era where data is often referred to as the “new oil,” the importance of data security can't be overstated. Breaches can lead to financial losses, reputational damage, and lost trust among customers and stakeholders. One primary step toward mitigating security risks is choosing a data store that has been designed with a robust security framework.

Unravelling the TDIR framework: Conception, evolution, and categorization

Cybersecurity is a mix of both reactive and proactive approaches. In the past, enterprises were often limited to the reactive approach. With compliance and security strategies gaining prominence, the proactive approach is also getting the spotlight. Compared to other industries, cybersecurity is highly dynamic and cybersecurity teams adopt any new technologies that can help them optimize.

Featured Post

A Broken Industry - 'Changing the narrative of the 'war on cybercrime'

The world is at war; But not in the way most people think. While traditional conflicts rage all over the world from Syria and Yemen to Ukraine, the murkier war against cybercrime rages all around us. This is a war where every corporate network, personal device or piece of software code is a potential battleground, and the casualties are not measured (primarily at least) in deaths, but in the associated cost to the end-user and the economic systems in which they work.

The Future of Transactions: Understanding Secure Subscription Payment Systems

In the age of digital commerce, subscription payment systems have gained significant traction, marking a shift in how businesses manage transactions. These systems not only provide convenience but are also pivotal in ensuring secure, seamless payments. This guide takes an in-depth look into secure subscription payment systems, focusing on their benefits, the technology behind their security, the rise of subscription models, and their role in the future of transactions.

19 SEO Ranking Factors That Actually Matter in 2023

Search Engine Optimization (SEO) is a crucial digital marketing strategy for businesses seeking visibility in the vast expanse of the internet. SEO involves optimizing a website in a way that helps it rank higher on search engine result pages (SERPs). The ranking factors that affect SEO evolve constantly, primarily due to frequent updates to search engine algorithms. As we navigate through 2023, we caught up with a leading Australian agency Safari Digital to discuss the 19 most crucial SEO ranking factors to consider.

9 Common Types of Security Incidents and How to Handle Them

Cybersecurity is one of the top concerns for organizations. In recent years, and that’s not going to change any time soon – unless, if anything, cybersecurity becomes the top concern. So what can an organization do about the rise in cybersecurity incidents? In this article we’ll take a closer look at security incidents: what they are, the most common types, and how to prevent and mitigate them.

The Bookmark Trap: How Discord Admins Fell Prey to Social Engineering

Brian Krebs wrote: "A number of Discord communities focused on cryptocurrency have been hacked this past month after their administrators were tricked into running malicious Javascript code disguised as a Web browser bookmark. "According to interviews with victims, several of the attacks began with an interview request from someone posing as a reporter for a crypto-focused news outlet online.

AI Voice-Based Scams Rise as One-Third of Victims Can't Tell if the Voice is Real or Not

As audio deepfake technology continues to go mainstream as part of the evolution in AI-based tools, new data shows there are plenty of victims and they aren’t prepared for such an attack. Imagine you get a call from your child or grandchild telling you they’re in some kind of trouble, an accident, etc. and need money. And it really does sound like them. Would you help? Scammers who are making use of AI to synthesize sound-alike voices as part of vishing scam calls are hoping you will.