Please turn on your JavaScript for this page to function normally.
shield
Protecting your company from fourth-party risk

In a world that is becoming ever more interconnected, organizations are learning firsthand that they are not only vulnerable to the adverse events that their vendors …

ransomware
Ransomware and cyber insurance: What are the risks?

High-profile ransomware events, such as the Colonial Pipeline and Kaseya attacks, continue to create eye-popping headlines about how easily a cybercriminal group can cripple …

How to rethink risks with new cloud deployments

These days, technology seems to evolve at the speed of light. Infrastructures change, attack surfaces reduce and multiply and, not surprisingly, your cloud environment …

cloud binary
Application security approaches broken by rising adoption of cloud-native architectures

The rising adoption of cloud-native architectures, DevOps, and agile methodologies has broken traditional approaches to application security, a survey of 700 CISOs by Coleman …

mind map
How prepared is the intelligence community to tackle possible threats?

Human psychology is complex. It’s a dynamic and sometimes contradictory system. Compounding this problem is the rapid progress of technology and social media, toppling …

Salesforce
Acting on a security risk assessment of your organization’s use of Salesforce

Salesforce isn’t rocket science, but the software has an incredible array of tools, which is why securing it demands a unique (and sometimes complex) approach. If you’re …

Car
Cybersecurity risks connected to AI in autonomous vehicles

By removing the most common cause of traffic accidents – the human driver – autonomous vehicles are expected to reduce traffic accidents and fatalities. However, they may pose …

Code42 Incydr
Review: Code42 Incydr – SaaS data risk detection and response

Incydr is Code42’s new SaaS data risk detection and response solution, which enables security teams to mitigate file exposure and exfiltration risk without disrupting …

arrows
How to reduce the risk of third-party SaaS apps

Third-party SaaS apps (and extensions) can significantly extend the functionality and capabilities of an organization’s public cloud environment, but they can also …

NIST
Only 44% of healthcare providers conform to protocols outlined by the NIST CSF

Only 44% of healthcare providers, including hospital and health systems, conformed to protocols outlined by the NIST CSF – with scores in some cases trending backwards …

risk assessment
How do I select a risk assessment solution for my business?

One of the cornerstones of a security leader’s job is to successfully evaluate risk. A risk assessment is a thorough look at everything that can impact the security of …

shield
Better cybersecurity hinges on understanding actual risks and addressing the right problems

SANS Technology Institute’s Internet Storm Center (ISC) has been a valuable warning service and source of critical cyber threat information to internet users, …

Don't miss

Cybersecurity news