Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Embracing Failure to Enhance Cybersecurity Responses | Razorthorn Security

In this enlightening episode of the Razorwire Podcast, explore the transformative power of embracing failure within organizations to accelerate response times to cybersecurity threats. Learn why fostering a culture that views mistakes as learning opportunities is crucial for rapid adaptation and improvement, particularly in handling phishing attacks—the most common method used by attackers. The discussion delves into how a shift in organizational culture can dramatically reduce the average time it takes to detect and respond to breaches, currently standing at a staggering 287 days.

Reducing Burnout in Cybersecurity: A Human-Centric Approach | Razorthorn Security

This episode of the Razorwire Podcast emphasizes the importance of a human-centric approach in cybersecurity workplaces to combat stress and reduce burnout rates. Discover how encouraging openness about mistakes and reducing process friction can not only mitigate human risk in cybersecurity but also enhance the overall well-being of professionals in the field. Learn about the benefits of fostering an environment where challenging the status quo and admitting errors are viewed as opportunities for growth and improvement.

Beyond Quick Fixes: Tackling Burnout in Cybersecurity with Systemic Change | Razorthorn Security

This Razorwire Podcast episode tackles the deep-rooted issue of burnout in cybersecurity, emphasizing that superficial solutions like wellness classes are not enough. Discover how addressing burnout requires comprehensive, multidisciplinary approaches that focus on both individual resilience and systemic organizational changes. Learn how poor organizational culture contributes to high burnout and attrition rates, and explore actionable strategies to create a more supportive and sustainable work environment for information security professionals.

TrustCloud Product Updates: April 2024

You know us: Every month we’re cooking up something new! Here are the updates that hit TrustCloud this month. TrustShare GraphAI will answer questionnaires for you with accurate, high-quality responses. TrustShare is getting a huge AI glow up. GraphAI’s generative AI capabilities will now fill in answers that are more context aware, more natural, and more accurate than ever before.

Introducing ISO 42001 and NIST RMF Frameworks

While AI has created exciting new opportunities for business, it has created urgent questions around ethics, responsible use, development, and management. AI also introduces a new, and often nebulous, element of organizational risk. With the introduction of two frameworks, ISO 42001 and NIST AI RMF, companies can now implement, demonstrate, track, and build their responsibility and trust around AI. TrustCloud is very pleased to announce that we support both ISO 42001 and NIST AI RMF.

Enabling More Precise Evaluation of Email Security with DMARC

Email is a well-known and widely used attack vector for malware distribution, phishing, and many other types of threats. For this reason, we evaluate certain email security practices as part of the Diligence category of risk vectors used to calculate Bitsight Security Ratings. On April 30, 2024, we added a new email security evaluation focused on the use of Domain-based Message Authentication, Reporting, and Conformance (DMARC) records.

Keeper Webinar: Building a Robust Governance, Risk & Compliance Framework: Challenges & Solutions

IT Compliance doesn't have to be chaotic. Join Teresa Rothaar, Keeper Security's Governance Risk & Compliance Senior Analyst, in this webinar for ActualTech Media on the challenges and solutions to build a robust GRC framework. Keeper helps every organization get full visibility and control over employee password strength, credential sharing, permissions, zero-trust network access and dark web exposure, strengthening auditing and compliance for HIPAA, PCI DSS, SOX, GDPR, CCPA and more.

Identity risk management: What is it and how can you achieve it?

Risk. It’s more than just an infuriating board game from your childhood. And when identity risk is involved in your cybersecurity landscape – and it will be involved, since identity is one of the most easily accessible and most frequently attacked facets of your IT environment – the potential consequences of its compromise extend well beyond losing control of a fantasy continent on a game board.

UK Must Prioritize Cybersecurity Governance Amidst Rising Threat of Cybercrime

If the UK is serious about digitizing the economy, then cybersecurity is priority number one and the first step should be to take a hard look at the UK Government's recently released draft code of practice for cybersecurity governance. Whilst governments around the globe have been kicking around the metaphorical can of AI regulation, something has been going on in the background: something tangible, incredibly dangerous, and increasingly more frequent: cybercrime.