Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

How to Audit Governance

Governance, risk, and compliance (GRC) have become buzzwords in cybersecurity. As governments and industry standards organizations respond to the data breach landscape by creating new compliance requirements, governance has become fundamental to creating an effective risk management program. Auditing governance requires organizations to communicate with internal and external stakeholders.

3 enemies - the $96B in cyber crime that nobody wants to talk about

They say that bad things always come in threes. The adage may testify to little but the popularity of superstition, but for security executives today, this notion regrettably passes muster. Crime, complexity and cost are three foes that every CISO must face, and while most companies think crime is the enemy, in many cases it is the latter two heads of this “cyber-cerberus” that deliver the most certain bite.

The Main Elements of a Security Risk Analysis Report

No organization has complete protection against today’s sophisticated and fast cyber-threats. To maximize the security posture of your enterprise, you need to evaluate the risks in an effective manner, in addition to the various other security measures. The report in which you describe all the risks – coined as “Security Risk Analysis Report” – has utmost importance for the effectiveness of the overall Risk Management Program.

The Path to Cyber Resilience: Takeaways from the Scalar 2019 Security Study

The annual Scalar Security Study, published in February 2019 and conducted by IDC Canada, identified a new normal across the threat landscape: cybersecurity incidents, be it exfiltration, infiltration or denial of service, occur on a regular basis. Focused on small, midsize and large organizations in Canada, the study confirms that intrusions are inevitable and moreover that a majority of organizations experience successful attacks.

Why Cyber Security is Key to Enterprise Risk Management for all Organizations

Large organizations have always focused on managing risk, but the technological breakthroughs that have enhanced our world in countless ways have also transformed how leading executives engage in enterprise risk management (ERM). The pervasive and ever-expanding threat of cyber crime means that comprehensive strategies for cyber security are now absolutely essential for all organizations.

Getting to know your data breaches

Since GDPR came into effect, people tend to be a lot more aware of their personal data or rather, data breaches containing their personal data. Most data breaches that appear on the news tend to be what I call ‘big boy breaches’. These refer to massive breaches from the big companies consisting of millions and millions of data records.

Cyber Security Issues and Challenges in 2019

Cyber security is a continuously evolving enigma which cannot be ignored by the organizations anymore. Since the attack techniques are getting intrusive as well sophisticated, it has become mandatory for a business to invest in its cyber security to minimize the chances of cyber attacks. In this article, we will discuss five of the most serious cyber security issues and challenges for modern-day businesses.

Detectify for developers

Detectify is a scalable web app security scanner that automates 1000+ security tests to help you release secure applications. With Detectify, you can test your code with real exploits to identify and fix vulnerabilities in both staging and production environments. The service is continually updated with new security tests thanks to Detectify Crowdsource, a global network of handpicked security researchers.

Risk Management in the Retail Industry

Cyber risk management for the retail industry increases in complexity on an almost daily basis. Using Software-as-a-Service (SaaS) tools eases business operations by streamlining payment processing and inventory management. However, since automated tools connect to the internet, they add new risks that retailers need to mitigate.