Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Risk Management

Vulnerability Scans Are a Must but Not Enough

Vulnerability scans test for different misconfigurations and report the vulnerabilities. But they have 2 big drawbacks: You need to get consent from a company before you do a vulnerability scan on them. You may get a very rigorous readout from a vulnerability scan. But then a sleep-deprived IT administrator misconfigured the system, making your report irrelevant. On the other hand, security ratings don’t need anybody’s consent and provide continuous, real-time monitoring.

SecurityScorecard Is One of Only Five Organizations to Partner with the Institute for Security and Technology's Ransomware Task Force to Create the Blueprint for Ransomware Defense

On August 4, the Institute for Security and Technology’s (IST) Ransomware Task Force (RTF) announced the release of its Blueprint for Ransomware Defense - a clear, actionable framework for ransomware mitigation, response, and recovery aimed at helping organizations navigate the growing frequency of attacks.

Federal and Local Government Agencies Continue to Use Section 889 Prohibited Products

Section 889 of the John S. McCain National Defense Authorization Act (NDAA) for Fiscal Year (FY) 2019 prohibits the procurement or use of Huawei, ZTE, Hytera, Hikvision, or Dahua telecommunication and video surveillance products and services by federal agencies, government contractors, and the recipients of any federal grants or loans (this latter category includes many state and local governments).

Using Business Analytics for Risk Performance Management

Risk management is the process of identifying, evaluating, and controlling risks to an organization’s operations and financial performance. These dangers can be caused by several things, such as economic unpredictability, legal responsibilities, technological problems, strategic management blunders, accidents, and natural calamities. An effective risk management program helps a business navigate all potential hazards.

All You Wanted to Know About Data Security Fabric

Data is one of the most valuable assets for modern organizations. The right type and quality of data allows companies to resolve problems and improve business performance; it guides enterprise decision-making and drives business strategy. Data is also vital to improve cybersecurity, maintain regulatory compliance, and strengthen the competitive posture. In short, data matters. Organizations must protect their data assets from unauthorized access, compromise, and theft.

Looking for a Digital Forensics Expert Witness? Guidelines and Procedures for Testimony

In 2022, a lot of crime involves a digital element. The digital element can be anything from text messages to complex cyber attacks on organizational networks. If you're prosecuting, a digital forensics expert can help you build a stronger case by gathering and documenting evidence and testifying in court on their findings.

Was the Explosion at Freeport LNG a Result of a Russian Cyber Attack?

On June 8, an explosion took place at Freeport LNG’s liquefied natural gas (LNG) export facility in Quintana, Texas. The company later explained that the explosion resulted from a rupture in an over-pressurized pipeline, but did not comment as to how the pressure built up enough to cause such a rupture. In the wake of the explosion, Freeport reported that the outage resulting from it would persist until September, after which the facility would only resume partial operations.

What is the Internet of Things (IoT)? Definition and Critical Risks

The internet of things (IoT) is a system of interconnected computers, devices, digital machines, and objects, all marked with unique identifiers (UIDs) and enabled to transfer and share data over a network. It was first coined by Kevin Ashton in 1999 when he envisioned a future where things communicated with each other, apart from human interaction With the evolution of web-enabled smart homes and smart devices in nearly every corner of life, IoT attack surfaces begin to emerge.

Exploit of Log4Shell Vulnerability Leads to Compromise of Major South American Vaccine Distributor

On June 23, The Cybersecurity and Infrastructure Security Agency (CISA) and the United States Coast Guard Cyber Command (CGCYBER) released a joint Cybersecurity Advisory (CSA) warning network defenders that cyber threat actors, including state-sponsored advanced persistent threat (APT) actors, have continued to exploit CVE-2021-44228 (Log4Shell) in VMware Horizon® and Unified Access Gateway (UAG) servers.

How to Determine Your Risk Tolerance Level

All the risk management measures an organization might take to address cybersecurity threats depend on one critical question: What is the organization’s risk tolerance? Risk tolerance is a concept borrowed from investment strategy and is part of various risk assessment methodologies. Investors with high risk tolerance are willing to endure volatility in the stock market and engage in risky investments; those with a low risk tolerance are more cautious.