Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Modernizing Cyber Risk Registers: From Spreadsheets to SaaS Solutions

‍In the early days of cyber risk management, during which the responsibilities of a security and risk manager (SRM) were relatively siloed and limited in scope, leveraging a spreadsheet to maintain a cybersecurity risk register was a practical and widely accepted solution. At that time, the volume and complexity of cyber risks were much more manageable than they are today, making spreadsheets a convenient way to catalog them, prioritize mitigation activities, and track progress.

Setting the Standard for AI Compliance: Vanta introduces AI Security Assessment

New offering helps organizations easily evaluate vendor AI's risk. Vanta becomes first trust management platform to achieve ISO 42001. Debuting new AI achievements and resources at booth #2127 at RSA Conference April 28 - May 1.

The Shadow AI Data Leak Problem No One's Talking About

Is your team's favorite new productivity tool also your biggest data leak waiting to happen? Generative AI (GenAI) assistants like ChatGPT, Microsoft Copilot, and Google Gemini have quickly moved from novelty to necessity in many workplaces. These tools use machine learning and advanced algorithms to help employees draft content, analyze data, and even write code faster than ever before.

Top 10 External Risk Management Software Solutions in 2025

Your organization’s attack surface extends far beyond your direct control. Exposed cloud assets, vulnerable APIs, and the security posture of your third-party vendors all introduce significant risks. Understanding and managing this external exposure is paramount. Effective External Risk Management (ERM) provides the critical visibility and intelligence needed to proactively address these threats.

Understanding MCP: Security Implications

MCP, short for Message Communication Protocol, refers to a category of protocols used for exchanging structured messages between systems or applications. It was developed primarily to meet the communication needs of early enterprise systems that required: MCP protocols are often seen in banking, insurance, healthcare, and telecom industries—sectors where many systems were developed before APIs became mainstream.

Sensitive Data: Examples & How to Protect It

As a security professional navigating the new challenges constantly cropping up in cybersecurity, it’s critical to understand the ways your organization’s data could be exposed. Safeguarding sensitive information is paramount for organizations across all industries. Whether it's personal data of customers and employees or proprietary business information, the consequences of data breaches can be severe, ranging from financial losses to reputational damage.

The Hidden Risk in Your Cloud: And What to Do About It

It's easy to assume everything in the cloud is sorted. Files get saved, apps sync across devices, permissions exist. And on paper, that sounds tidy enough. But in practice? Data goes wandering. A spreadsheet ends up in the wrong folder. A document shared with the wrong person stays shared. A test environment is spun up, used once, then forgotten. Nobody deletes it, of course. Nobody remembers it, either.

The Critical Importance of Supply Chain Risk Management in Cybersecurity

In the contemporary digital era, supply chains have transcended their traditional role as mere logistical networks. They have evolved into pivotal ecosystems that underpin the success of modern businesses. Nevertheless, as these intricate systems undergo digital transformation, they have become increasingly vulnerable to cyberattacks.

How LivePerson automates vulnerability management to reduce risk

For modern security teams, managing vulnerabilities efficiently is critical to reducing risk and maintaining a strong security posture. However, the sheer volume of vulnerabilities, complex IT environments, and resource constraints make traditional approaches unsustainable. Automating key aspects of vulnerability management not only speeds up remediation, but also ensures consistency and accuracy across the entire vulnerability lifecycle.

Automating your risk register using Tines Records

A risk register is a GRC tool used by teams to identify, assess, and manage various risks within an organization. It acts as a centralized repository and looks at the impact and probability of a risk to prioritize its management. In cyber security, a risk register helps maintain compliance with various standards like the ISO 27001 Information Security Management System (ISMS), NIST SP800-30 Guide for Conducting Risk Assessments, or the new European NIS 2 directive.