Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Risk Management

Leveraging Cyber Risk Quantification for NIS 2 Compliance

‍In response to the growing number of disparate cyber regulations across its member states, resulting in inconsistent cybersecurity practices, the EU drafted Directive 2022/2555, more commonly known as NIS 2. This sweeping directive, officially in effect in October 2024, aims to ensure a more uniform, proactive approach to cyber risk management across the union in the face of an interdependent market and increasingly costly risk landscape.

UpGuard's Cyber Risk Ratings: Enhancing Risk Categorization for 2024

Each year, we revisit our risk rating system to ensure it best reflects the needs of security practitioners safeguarding their organizations and supply chains. For our 2024 update, we’ve made two closely related changes: we’ve recategorized some of our existing findings to make an organization’s risk profile more understandable and recalibrated our scoring algorithm to more clearly illustrate the impact of specific risks.

What is Enterprise Attack Surface Management?

The rapid expansion of the digital landscape adds increasing complexity to cybersecurity, especially for enterprises that could have up to 100,000 vendors in their supply chain. Addressing these challenges requires implementing an Attack Surface Management (ASM) strategy tailored to enterprise businesses' unique risk profiles. This post outlines the importance of ASM for enterprises and offers a strategy for ensuring its effective implementation.

Keeper 101 | Enterprise: Risk Management Dashboard

The Keeper Risk Management Dashboard is a powerful feature of the Keeper Admin Console that provides comprehensive security posture information covering end-user deployment, utilization, cloud configuration, and event monitoring. This critical data helps administrators ensure that risks are remediated and compliance is enforced effectively. The Risk Management Dashboard monitors key metrics and leverages Keeper Security's Benchmarks to enforce the highest level of security in your environment across all users and devices.

The Importance of Application Security Posture Management in Business

Application security posture management (ASPM) is a critical process for businesses today. It involves assessing and managing the security risks in business applications to protect against cyber threats. With advancing technology, cybercriminals are becoming more sophisticated, making it crucial to maintain a robust application security posture. By doing so, businesses can prevent data breaches, ensure business continuity, and build customer trust.

4 Simple Steps to Implement Risk-Based Vulnerability Management

Imagine if your fire alarm sensor went off every time you burned your toast or lit candles on a birthday cake. After a few false alarms, you’d probably start ignoring them or even turn your sensor off just to get some peace. This is what many information security teams are experiencing with vulnerability alerts.

Continuing to Evolve Next-Gen Asset Attribution Through Service Provider Collaboration

One of the primary reasons that the Bitsight Security Rating is widely respected and closely correlated with real-world security outcomes is the scale and sophistication of our asset attribution capabilities. In a recent post, my colleague Francisco Ferreira shared an update on the momentum building with Bitsight Graph of Internet Assets (GIA), the AI-powered engine we use to map assets to organizations and build our Ratings Trees.

How Cybersecurity Risk Assessments Will Need to Evolve for 2025

2025 is drawing near, and the cybersecurity scene is changing quickly. Organizations must adapt how they undertake cybersecurity risk assessments in tandem with the ongoing evolution of technology and the escalating sophistication of cyber-attacks. In order to address the difficulties of the near future, cybersecurity risk assessments will need to change in ten key areas, as this essay examines.

The Value of Cyber Risk Quantification Models Vs. CRQ Frameworks

From the individual to the global level, managing risk is a part of life. While in some contexts, poor risk planning merely results in minor, inconsequential outcomes, in others, such negligence can be catastrophic. Take the July 2024 CrowdStrike incident, for instance, during which a faulty software update put global airlines out of commission, took broadcasters off the air, and cost the market upward of $5 billion in uninsured losses.