Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Risk Management

ChatGPT: The Cyber Risk vs. Reward

There has been a lot of talk about ChatGPT since it burst onto the market several months ago. And despite its infancy and the lack of standardized regulations around intelligent automation — the OpenAI tool has exploded into the tech ecosystems of businesses everywhere. While many see significant benefits from its use, few discuss the cyber risk to the industry and our organizations.

What is Vulnerability Monitoring? Benefits, Tools, and Best Practices

In today’s ever changing cyber risk landscape, your organization must adopt a vulnerability management framework to control exposure and remediate risks in a timely manner. In an earlier blog, we explained the vulnerability management process. Here, we explore a key part of that process – vulnerability monitoring – in greater depth.

New regulation from the SEC to require companies to report how cyber risk could affect them financially

Against the backdrop of the growing frequency and severity of cyber attacks against enterprises, proposed new regulations from The Securities and Exchange Commission (SEC) are set to require publicly traded companies in the U.S. to analyze how cyber risk could affect financial statements. ‍

8 Dangerous Ransomware Examples

The threat of ransomware has been ever present in 2020, especially within the high-stakes industries like healthcare and those involved in the election. According to Verizon's 2019 Data Breach Investigations Report, 24% of security incidents that involved specific malware functionality exhibited ransomware functionality.

Committed to Improving the State of the World: Thoughts on the World Economic Forum's New Champions Leadership Dialogue

Following CEO and Co-Founder Aleksandr Yampolskiy’s attendance at Davos, and SecurityScorecard’s subsequent visit to Geneva to meet with world leaders at WEF Headquarters, Alex spoke this week to another community of WEF members near our headquarters in New York City during the Forum’s New Champions Leadership Dialogue. New Champions companies are mid-sized organizations transforming industries through new business models and market disruptions.

Cut Costs, Not Corners: Risk Management Today

In today’s business landscape, managing risk has become an increasingly critical concern. The “usual” risks (such as data breaches) paired with the completely unforeseen ones (like the collapse of SVB) have made companies more cautious with their next steps. With tighter budgets and limited resources, it can be quite challenging for CISOs and CTOs to effectively manage risk while ensuring business continuity.

How to Scale a Cybersecurity Program Across the Expanding Attack Surface

New security vulnerabilities are emerging every day. The number of new disclosed cyber vulnerabilities jumped 25 percent in 2022, and the number of known exploited vulnerabilities—ones observed to be exploited by malicious actors in the wild—nearly doubled from 2021 to 2022. Remediating vulnerabilities rapidly and effectively reduces the likelihood of your organization becoming the victim of a cyber attack. Consider.

Creating Trust in an Insecure World: Strategies for Cybersecurity Leaders in the Age of Increasing Vulnerabilities

Vulnerabilities are on the rise, and it's not just the number that's growing; the severity of these vulnerabilities is also increasing. Cybercriminals are taking advantage of these vulnerabilities to launch sophisticated attacks, leading to data breaches, ransomware, and other devastating cyber incidents.