Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The CEO's Take: The Human Element of Security

“Human error contributes to 95% of data breaches.” From unsecured collaboration channels to poor password hygiene, the attack surface of an organization extends across both its vendor ecosystem as well as all of the employees within it. Join Aleksandr Yampolskiy (CEO & Co-Founder, SecurityScorecard) and Marc van Zadelhoff (CEO, Mimecast) for this discussion on: SecurityScorecard monitors and scores over 12 million companies worldwide. Find your company's security score for free at SecurityScorecard.com.

GRC impact: Challenges to opportunities of remote work

As organizations worldwide recalibrate their operations in the wake of unprecedented change, remote work has emerged not simply as a fleeting trend but as a mainstay of modern business. For compliance experts and leaders alike, this shift has introduced a complex interplay of governance, risk management, and compliance (GRC) challenges and opportunities.

Why Transparency Is Critical to Cyber Resilience in the Financial Sector

Transparency isn’t optional—it’s foundational to cyber resilience. In this clip from the Exposed: Cyber Risk in the Financial Sector and its Supply Chain webinar, Roland Cloutier, Global CSO and Digital Business Enablement Executive (TikTok, ADP, EMC), explains why visibility across the financial ecosystem is essential for managing third-party risk and preventing cascading cyber attacks.

AI 2026: A Look Ahead

2026, the perfect time to reflect on how far technology has come and what lies ahead. Without a doubt, Artificial intelligence has gone from a niche to an omnipresent force, reshaping how we work, build, and defend. While organisations have speed-ran the adoption of AI and machine learning, cybercriminals have been just as fast to exploit them, and AI now powers business decisions, customer interactions, and – predictably – cyberattacks.

Quantified Cyber Risk Through an ERM Lens in NIST IR 8286 Rev. 1

Lack of data has rarely been a challenge that cybersecurity leaders in the enterprise setting have faced. In fact, cyber risk data is usually in abundance. The obstacle, thus, is instead twofold. Teams must first make sense of all of that information, and leadership must then be able to communicate what it means in a language that supports high-level decision-making. That gap between information and deeper understanding is where many cyber risk programs flounder.

The Media Mogul's Take: Cyber & Storytelling in the Age of AI

Despite the connection with Robert De Niro, we won’t be spoiling Zero Day for you yet. But there is a large intersection between the future of media, cybersecurity, and AI, and we’re excited to jump into it! Join Aleksandr Yampolskiy (CEO & Co-Founder, SecurityScorecard) and Sandy Climan (President, Entertainment Media Ventures, Inc.) in this webinar, where they chat about: SecurityScorecard monitors and scores over 12 million companies worldwide.

Cloud and Platform Migration: Cost, Risks, and Best Practices for Enterprises

In today's fast-evolving digital economy, staying competitive has nothing to do with relying on legacy systems. Even if your aging solution seems to be reliable because you're so accustomed to it, you'll definitely face blockers while trying to scale or innovate. Without modernized software.
Featured Post

From Spend to Impact: Fixing the Disconnect in U.K. Supply Chain Security

In today's hyperconnected economy, supply chains are no longer just operational backbones; they are strategic lifelines, shaping resilience, competitiveness, and innovation across industries. Yet for many U.K. organisations, these lifelines are becoming increasingly fragile. The most recent iteration of our global supply chain defence research indicates that - despite pouring significant resources into third party risk management (TPRM) programs and embracing new technologies to shore up their supply chain defences - U.K. businesses continue to face a high rate of supply chain breaches.

Cyber Threat Intelligence Report: Top 4 Malware Targeting Finance

The finance sector continues to face sustained and evolving cyber threats driven by the high value of financial data, credentials, and transactional access. Malware remains one of the most common and effective mechanisms used to compromise financial institutions, payment platforms, and end users, enabling fraud, data theft, and operational disruption.

A Practical Approach to Continuous Threat Exposure Management

Organizations face a complex cybersecurity conundrum. Attack surfaces are expanding faster than SOC teams can scan. All of which is leading to a never-ending cycle of swivel-chair security, context-free lists, increased alert fatigue, and slow remediation. The strategic pivot needed to combat this is Continuous Threat Exposure Management (CTEM). A structured and essential alternative that moves teams away from reactive scanning to proactive, ongoing validation and prioritization.