Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

FedRAMP Certification and Data Security

Federal Risk and Authorization Management Program (FedRAMP) and State Risk and Authorization Management Program (StateRAMP) are pivotal frameworks for securing cloud services used by federal and state governments, respectively. These programs mandate stringent security protocols, emphasizing the need for organizations to manage and disclose third-party involvement in delivering software services to the government.

Is the ASX 200 Resilient to Cyber Threats? Our Report Says No.

In today’s rapidly evolving digital landscape, managing cyber risk has become essential for sustaining corporate growth and resilience. Cyber risk management requires balancing corporate growth against the evolving tactics of threat actors and governmental regulations – a daunting task that requires continuous measurement and strategic reflection.

Navigating the SEC Cyber Regulations and 8K reporting for smaller entities

On June 15, 2024, half a year after the SEC's cybersecurity regulations were enacted, smaller organizations—those with a public float under $250 million or annual revenue under $100 million—were finally subject to report material cyber events on Form 8-K, Line 1.05. However, as the larger entities have already demonstrated, determining materiality can be complex, requiring stakeholders to consider financial loss, compromised data records, operational impacts, and more.

Office Hours with Dr. Jack Freund With special guest, Or Amir, Product Manager at Kovrr

* Explore some of the top use cases for which our on-demand CRQ platform is utilized, walking through the specific features and how to leverage them for each of the use cases. These use cases include high-level communication and board reporting, insurance optimization, budgeting, and additional resource justification.

The Botnet is Back: SSC STRIKE Team Uncovers a Renewed Cyber Threat

A silent danger is sweeping through the world’s critical infrastructure. The SecurityScorecard STRIKE Team has uncovered a resurgence of Volt Typhoon—a state-sponsored cyber-espionage group from the Asia-Pacific region, known for its precision and persistence. This is no ordinary attack. Volt Typhoon exploits unprotected, outdated edge devices within targeted critical infrastructure.

ICS Security Is a Team Sport

As we discussed in the first article in this series, there are many Internet-exposed control systems, but they are very different from traditional IT systems and require a different security approach. With these systems being so critical and controlling processes that can potentially lead to loss of life if they fail, what is being done to tackle this issue? In this article I’ll dive into this and more, looking at.

9 Cyber Risk Management Trends in 2025 Every Business Should Know

‍The evolution of the cyber risk management landscape is constant, and with each passing year, market players find themselves in the position of having to readjust their strategies, whether in brand positioning, cybersecurity, or beyond, to account for these consequent changes. While some of the shifts are welcome, others are less so. Nevertheless, all require careful foresight.

How to Conduct a Comprehensive Base Security Assessment

Conducting a comprehensive base security assessment is crucial. It ensures the safety of personnel, assets, and information. With the rise of various threats, it's more important than ever to evaluate and enhance security measures systematically. A thorough assessment not only identifies weaknesses. It also assists in implementing effective security controls to mitigate risks. In this detailed guide, we will explore essential steps and best practices to perform a base security assessment. We will enable you to deploy effective security solutions tailored to your environment.