CTI Roundup: How Weak is Your Password?
Key findings from the Specops 2023 Weak Password Report, a look at the recently exposed APT43 hacking group, and a breakdown of the New AlienFox toolkit.
Key findings from the Specops 2023 Weak Password Report, a look at the recently exposed APT43 hacking group, and a breakdown of the New AlienFox toolkit.
Optimize your security workflows and deliver intelligence everywhere you work with the largest ecosystem of integrated technology partners in cyber risk ratings. SecurityScorecard provides Application Programming Interface (API) access for all our data allowing you to get more contextual security insights, app integrations, and detailed information about your current or prospective vendors. You can leverage our APIs and Integrations in the following ways.
In today’s ever changing cyber risk landscape, your organization must adopt a vulnerability management framework to control exposure and remediate risks in a timely manner. In an earlier blog, we explained the vulnerability management process. Here, we explore a key part of that process – vulnerability monitoring – in greater depth.
Cloud computing has made its way to organizations’ IT infrastructure strategy rapidly over the past few years. In particular, Canadian businesses are showing an increased adoption. This article decodes how Canada’s IT infrastructure shaped up in the last decade, why data sovereignty is now a hot topic, and what the future holds for the cloud. While on-premises IT infrastructure continues to be relevant even today, both SMBs and enterprises are now embracing the cloud more than ever.
Another supply chain attack requires an urgent response from security teams.