Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

National Cybersecurity Deep Dive: Invest in a Resilient Future and Forge International Partnerships

The first three pillars of the National Cyber Security Strategy focused on activities that could be accomplished in the near term–perhaps within a few years. The last two pillars start looking at some challenges that we need to address now.

ThreatQ v5: An Even Smarter Single Source of Truth

We’ve come a long way since ThreatQ v4 and our own Jay Allmond, UK Threat Intelligence Engineer at ThreatQuotient, recently shared the details during a hands-on webinar that’s now available on-demand. In this 30-minute session that as Jay says, “is light on PowerPoint and heavy on nerdy stuff”, we review the basics of the ThreatQ Platform and dive deep into some of the newest capabilities.

How Do You Perform a Supplier Risk Assessment?

When choosing a supplier to partner with, organizations need to perform their due diligence and assess the cyber risks associated with each particular supplier using risk assessment evaluations. Part of the supplier lifecycle management process includes ensuring that these third parties are meeting minimum security requirements, maintaining strong cybersecurity programs, and adhering to all relevant compliance regulations.

Quality of Experience vs Quality of Service: Which are You Getting?

Quality of Service (QoS) is a standard metric for any infrastructure, networking, or operations team contracting with a tech vendor The average network SLA, for example, is crawling with QoS metrics covering a range of things, including packet loss, jitter, latency, bandwidth allocation, response time, and uptime.

Users From Two Dating Sites Get Exposed in Latest Breach

A few very personal and private specialized dating sites were recently hit by data attacks that have led to users being exposed and potentially released onto the internet. Sites CityJerks and TruckerSuckers both experienced data breaches from the same individual who is attempting to sell the stolen data. The information taken from these accounts is highly private and personal, and anyone involved in this breach is likely to be unhappy about having their data exposed.

Women in Cybersecurity UNITE

The gender gap in STEM fields is a huge problem. Women only make up 25.2% of the computer and mathematical occupations in STEM, even though these jobs are among the fastest growing and highest paid in the world. Why is this happening? What can we do to bridge the gap and get more women these lucrative careers? Those are questions we’re doing our part to solve at One Identity UNITE.

A Closer Look at SecurityScorecard Marketplace

On average, organizations deploy 47 different cybersecurity solutions and technologies. This puts security, IT, and VRM teams in a difficult position, working with various tools that don’t integrate. One-third of organizations identify “non-integration of security tools” as a major roadblock to getting the total value of their investments.

New Study Reveals Shocking Truth About Data Breach Cover-Ups

Being a cybersecurity professional is a heavy responsibility and requires an exceptional amount of ethics and integrity. So, when cybersecurity software company Bitdefender released the results of their 2023 Cybersecurity Assessment, the results shocked me (more than they probably should have). The statistics on data breach cover-ups were alarming. 1.