Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

5 Most Common Cyber Attack Vectors & How to Avoid Them

The rapid pace of technological progress has let companies around the world benefit from operational improvements that lower costs. This progress, however, also brings risks that companies must take into account to protect their stakeholders. Cyber-threats are executed by cybercriminals using various means to gain access to an organization’s digital infrastructure.

How to Map Controls in Risk Management

Strong, reliable internal controls are an indispensable element of risk management. Properly functioning controls help to identify risks that could cause suffering, damage, harm, or other losses to your organization. To implement those controls, organizations typically use a control framework to guide their efforts.

Common Causes of Data Backup Failures

No matter how careful you are with your data storage and data protection measures, the risk of data loss is always there. You need to be sure that your company is prepared in the event of cyber attacks or system failures. Hence the need for data backup is so important; a company must have a copy of lost data for swift disaster recovery after a crisis. Too many organizations, however, overlook the possibility that their data backups might also fail.

What You Should Know About Web Shell Attacks

In a blog post published in February 2021, Microsoft noted that web shell attacks had been steadily increasing since mid-2020. There were 140,000 monthly web shell attacks from August 2020 to January 2021, more than twice the average from 2020. The increasing prevalence of these attacks has a simple reason: web shell attacks are easy to author and launch. So, what are web shell attacks? Why should organizations be more aware of them?

Reciprocity Announces Launch of Risk Intellect

Reciprocity® Risk Intellect is a new risk-analysis tool that, when used with the Reciprocity ZenGRC® platform, provides insight on the impact your compliance programs have on your cyber risk posture. By mapping your current compliance control assessments to cyber risks, it provides immediate context and visibility into which cyber risks and controls offer the greatest opportunity for reducing risk.

Signs You've Been Targeted for DDoS BotNet Recruitment

Cybercrime can take many forms, and the criminals behind such attacks work with increasing sophistication — even to the point that some companies may, unwittingly, be helping criminals launch attacks against other organizations. For example, botnets are an organized network of infected devices at a hacker’s disposal, which the hacker then uses to carry out cybercrime schemes by harnessing resources available to the bots on the system.

What is a DDoS Attack & How to Protect Your Site

Cybersecurity threats evolve constantly, and it’s difficult for any organization to stay ahead of emerging risks. A company’s best defense against security breaches is to understand the tactics that hackers use, and then plan accordingly. In this post we’ll examine one of the common kinds of cyber attacks — a DDoS attack — and discuss how best to protect your network infrastructure.

What is an SBOM and How is it Different from a CBOM?

In May 2021, President Joe Biden signed an executive order (EO) aiming to strengthen America’s cybersecurity. One key point in the EO was the need to improve software supply chain security, and reduce the vulnerabilities that allow adversaries to launch cyberattacks against public and private organizations.