Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

2024 Cyber Resilience Research: Aligning Retail Cybersecurity with Business Priorities

New data illuminates how retail leaders can prioritize resilience. In today’s retail environment, businesses embrace dynamic computing and other technological innovations to enhance operations and customer experiences. However, as these advancements accelerate, so does the risk of cyber threats.

BlueVoyant Identifies Credential Harvesting Campaign Targeting the Manufacturing Sector

BlueVoyant’s Threat Fusion Cell (TFC) uncovered a focused campaign targeting the advanced manufacturing sector. This campaign aims to steal Microsoft credentials, by spoofing Microsoft’s login page, to phish for potentially compromising sensitive information.

Badge Life: The CISO Team Takes on DEF CON

Earlier this month, a group of our intrepid pen testers from our Readiness & Resilience team at CISO Global ventured into the heart of the hacking world at DEFCON 32 in Las Vegas. This annual pilgrimage to the mecca of cybersecurity (and more importantly, hacking) is more than just a conference – it’s a hands-on deep dive into the cutting edge of hacking techniques and defensive strategies.

Streamlining Legal Workflows with NotatePDF

In the fast-paced world of legal practice, managing cases, documents, and communication is a constant challenge. Legal professionals must juggle numerous tasks, from drafting and reviewing documents to coordinating with clients and colleagues. The sheer volume of information and the need for accuracy and timeliness often lead to inefficiencies, errors, and missed deadlines. These challenges are further compounded by the demand for secure handling of sensitive data and compliance with strict regulations.

ThreatQuotient Launches ThreatQ Platform Availability in AWS Marketplace

ThreatQuotient announces that its leading Threat Intelligence Platform (TIP) is now available in AWS Marketplace, a digital catalog with thousands of software listings from independent software vendors that make it easy to find, test, buy, and deploy software that runs on Amazon Web Services (AWS).

The Vision Leading to Check Point's Acquisition of Cyberint

The cyber threat landscape is complex and includes many vectors of attack. Organizations face critical security challenges every day, such as stolen employee credentials, fake websites, and social media impersonation. Taking a binary point of view, those threats can be divided into two simplistic dimensions: external and internal. According to the 2023 Verizon DBIR, the external threats consume 83% of the total threats.

CTEM step-by-step guide | Stage one: Scoping

Welcome to our blog series on Continuous Threat Exposure Management (CTEM), where we dig into the five essential stages of implementing a robust CTEM program. Coined by Gartner in 2022, CTEM is a powerful process that can help continuously manage cyber hygiene and risk across your online environment. It’s also a lot to think about when you’re starting out, so it helps to break things down. Our series begins with the crucial first stage: Scoping.

ARMO's new security-boosting summer cocktail: Layered Vulnerability Scanning, SBOM View, and new Auto-Generated Network Policies

This summer ARMO is proud to announce a batch of new features designed to enhance your cloud security posture. We developed groundbreaking capabilities for in-depth vulnerability scanning, simplified vulnerability management with SBOM view, and streamlined network policy generation for two popular CNIs, Calico and Cilium.. We invite you to explore these new features and discover how they can add to your organization’s security. Let’s go.

How Automation and AI are Transforming GRC Management

There is no doubt that we now live in an AI-driven, automation-powered world. Across industries and markets, leaders and professionals are achieving the utility of AI in their processes. The same applies to Governance, Risk, and Compliance (GRC) management, but when one looks at the actual implementation, the data shows that there's still a long way to go. According to one recent report, only 21% of GRC leaders use AI to perform GRC activities.