Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Risk Management

Improve your risk posture: Introducing Risk Management customization

Today we’re excited to announce Risk Management customization, a collection of new capabilities in our platform that enhance the existing Risk Management solution and give you more flexibility to enable custom risk management scoring and prioritization. Currently in beta, Risk Management customization will be generally available in the coming months. ‍ ‍

How to Create a Vendor Risk Management Checklist

Vendor risk management is top of everyone’s mind considering recent headline grabbing supply chain attacks, such as SolarWinds. But as more vendors enter your digital supply chain, keeping up with vendor adoption is tough. According to Accenture, 79 percent of businesses are adopting technologies faster than they can address related security issues. For your organization to be truly protected against supply chain cyber risks, you must develop a robust vendor risk management (VRM) program.

Evidence-Based Strategies to Lower Your Risk of Becoming a Ransomware Victim

The ransomware trend continues to run rampant. One in four breaches involve ransomware, and organized crime actors use ransomware in more than 62 percent of incidents. Cyber criminals are taking advantage of these new opportunities to exploit a greatly expanded attack surface: But ransomware is only one small piece that a security leaders has to manage. The threat of ransomware is compounded by a distributed workforce, trends toward technology consolidation, geopolitical upheaval, and budget constraints.

Managing Cyber Risk in the Insurance Supply Chain

This week in London, SecurityScorecard hosted a roundtable discussion on cyber risk in the insurance supply chain. Keynote speaker Santosh Pandit, head of Cybersecurity at the Bank of England, shared his insights with 20 London-based insurers on managing cyber risk in the financial sector and the latest regulatory initiatives that may impact the insurance industry.

SecurityScorecard Identifies Infrastructure Linked to Widespread MOVEit Vulnerability Exploitation

New disclosures regarding the widespread exploitation of CVE-2023-34362, a new vulnerability affecting the MOVEit file transfer software, and the Cl0p ransomware group’s claim of responsibility for its widespread exploitation and the resulting data theft, have continued in the weeks since the vulnerability’s original publication.

3 Steps to Bridge Cyber Risk Communication Gaps

Effective communication is at the heart of any successful organization. It ensures that information is clearly conveyed, understood and acted on. But sometimes, despite our best intentions, there can be a gap between what we say and what the other person hears. The result? Confusion, misunderstandings and missed opportunities. When it comes to talking about cyber risk, you can bridge this communication gap by translating technical, information security data into the language of business impact.

Debunking the Misconception That CRQ Requires a Lot of Data Collection

Cyber risk quantification (CRQ) can be an invaluable tool. The ability to put a number to cyber risk aids in communicating with board members, planning strategic investments, calculating the return on investment of cybersecurity spending, and right-sizing cybersecurity insurance coverage. However, many organizations avoid taking advantage of CRQ due to some common misconceptions.

A Guide to Handling the MOVEit Attack

Last week, a vulnerability in the popular MOVEit managed file transfer service was exploited by the CL0P ransomware gang to execute data breaches – an increasingly common cybersecurity attack technique where popular software is exploited to target, by extension, their users. Victims of this hack include British Airways, Boots, BBC, and multiple US government agencies.

The CyberShield Event | Safeguarding The Digital Landscape

Obrela's inaugural event in KSA about Cybersecurity. A line up of international speakers and honoured guest were present to discuss intriguing topics. Our CEO, George Patsis, commenced the presentations by addressing the prevailing challenges in CyberDefense and highlighting the emergence of the new Cyber Risk Landscape. Furthermore, we delved into an in-depth discussion regarding the significance of adhering to Cyber Assurance standards, the advancements in Modern Threat Intelligence Centers, the utilization of AI to strengthen CyberDefense capabilities, and the intricate relationship between Cyber Criminals and Nations.