Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Publications

Top ten reasons to achieve Data Access Governance

You've got nearly all the pieces in place - you've implemented enterprise user provisioning, password management and have secured your organization's data. However, most days you still feel that sensitive data, such as IP or customer information, is at risk for a data breach. It's time to let a secure Data Governance strategy protect your sensitive data and reduce risk. Why, you ask? Take a look at this e-Book to learn ten reasons why.

The Top 10 Critical Pentest Findings in 2022

We live in a world where nearly everything can connect to the internet. While this is one of the greatest times in technology, it also brings an overwhelming amount of cybersecurity threats and challenges. CISOs and IT teams are pushed to the limits of being able to adequately and quickly protect their customers from emerging cyber threats. Cybercrime continues to increase by 15% year over year; costing the U.S. 6.9 billion just in 2021. By 2025 cybercrime will cost the entire world 10.5 trillion annually.

Top 10 Cyber Security Best Practices for SMBs

This white paper provides valuable information for small and medium-sized businesses (SMBs) as it relates to implementing security best practices as well as achieving compliance requirements. SMBs can use the information provided in the white paper to develop a roadmap to a mature information security program.

2022 seems to be on target for the lowest year of reported breaches by large US corporations

The number of data breaches reported in the first 6 months of 2022 has put this year on track to be the lowest year of reports in the last 5 years for large US corporations. By looking at the rate at which data breach events have been reported so far this year, we predict that the number of events reported is expected to be 15-20% of the number of breaches reported in 2021

Why Hackers Love Credentials: Parsing Verizon's 2022 Breach Report

The 2022 Verizon Data Breach Investigations Report (DBIR), the fifteenth such report in as many years, leads off with a startling statistic: Credentials are the number one overall attack vector hackers use in data breaches. Use of stolen credentials accounts for nearly half the breaches studied by Verizon, far ahead of phishing and exploit vulnerabilities, which account for 19% and 8% of attacks, respectively. Botnets, the fourth most common entry path for hackers, represent a mere 1% of attacks.

Importance of Insurance-Validated Risk Models to Quantify Cyber Risk

By its nature, cyber risk is dynamic. New events happen and evolve all the time, making it difficult for enterprises to financially quantify their financial exposure to cyber attacks. Around two years ago, for example, distributed denial-of-service (DDoS) attacks were making headlines, and now ransomware has come into heightened focus. It's reasonable to believe that other types of attacks will emerge in another two years and continue to change thereafter.

State of JavaScript Security - Nordic Financial Institutions

Bytesafe research found that 78% of public web sites for members of the Swedish Bankers' Association used open source packages with known vulnerabilities. The report indicates that many of the financial institutions have challenges keeping components up to date to avoid vulnerabilities. Download the full report to find out the state of Javascript security for the Nordic Financial Institutions in 2021.