Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Risk Management

Moving Bank Accounts After SVB Collapse? Watch Out for These Security Risks

The recent collapse of Silicon Valley Bank (SVB) has sent shockwaves through the tech industry, prompting many individuals and companies to move their bank accounts to other financial institutions. However, in the midst of this turmoil, cybercriminals are poised to take advantage of people’s fears and concerns. If you’re planning to move your bank account or have already done so, it’s important to be aware of the security risks associated with this process.

4 Main Takeaways from the SANS Institute's Survey on Ransomware and Malware Intrusions

In early March, the SANS Institute, whose mission is to empower cybersecurity professionals with the practical skills and knowledge to make the world a safer place, shared some insightful findings based on their survey on ransomware and malware intrusions in 2022. The survey included participants in various roles and industries from organizations worldwide of all sizes. “In this survey, we wanted to understand what the past year looked like for our respondents.

I caused my company's data breach. Now what?

You’ve just sat down to start your work day and you’re going through your emails, hot cup of coffee in hand. You see an email from your company’s IT department telling you to install an update ASAP. As soon as you click the link in the email, you realize you probably should have checked with IT first.

Duty of Care Risk Analysis (DoCRA) Explained

Legal authorities and the general public typically hold organizations accountable for any harm caused during their daily operations. The expectation is that leaders of those organizations have considered the potential harms that might happen, and implemented reasonable precautions to reduce or eliminate the risks. This is known as the “DoCRA standard.”

AlgoSec for IaC: How to identify risks from your pull requests

This video demonstrates how the AlgoSec platform integrates into your DevOps workflow early in the game, automatically identifying connectivity risks and providing ways to remediate them. You never have to leave where you're working to write better code. IaC Connectivity Risk Analysis enables immediate feedback right where you're working in the pull request by providing risk check results as comments.

The Secret to Reframing Risk

In today’s interconnected world, it’s easy for organizational leaders to see a security incident on the news and question if they could be next. Security is often top of mind but rarely a strategic priority, leaving many CISOs struggling to communicate how to reduce risk to the board. And the latest risk management trends could present new challenges for security leaders. How can you overcome them?

Getting Started on Governing AI Issues

Today we are going to keep looking at artificial intelligence and how corporations can get ahead of the risks thereof. Our previous post on AI was primarily a list of potential risks that could run rings around your company if you’re not careful; so what steps can the board and senior executives take to prevent all that? Well, first things first. AI is a new technology.

Fast Company Names SecurityScorecard as One of the World's Most Innovative Companies

We’re proud to announce that SecurityScorecard has been named to Fast Company’s prestigious annual list of the World’s Most Innovative Companies for 2023. This list highlights companies at the forefront of their respective industries, who are rethinking business and culture, while paving the way for future innovations. We’re honored to join the ranks of other innovators, such as OpenAI, Disney, and Tiffany & Co.

Data Breach Insurance vs. Cyber Liability Insurance: What's the Difference?

In today’s world organizations rely on computer systems and data for pretty much everything, including mission-critical processes and interactions with customers. And given the relentless increase in cybersecurity threats, this means that organizations’ need to protect themselves and their customer data from such threats is paramount. The average cost of a single data breach in the United States is now $9.44 million.

February Cyber Roundup

The Dutch Police have arrested three individuals for suspected ransomware activity, which generated at least 2.5M Euro in extortion fees. The actors are believed to have attacked thousands of organizations, compromising the data of tens of millions of individuals. This is another example of successful law enforcement activity against ransomware operations. Such activity has increased over the past year, leading to the arrest of several prominent ransomware group members, such as Revil and Netwalker.