Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Risk Management

Blockchain Security

The blockchain has emerged as a revolutionary technology with the potential to redefine how data is managed, stored, and shared. While initially associated with cryptocurrencies like Bitcoin, the blockchain’s applications extend far beyond finance, impacting industries ranging from healthcare to supply chain management. One of the blockchain’s key promises lies in ensuring data consistency, transparency, and privacy, critical elements in an interconnected and data-driven world.

Mapping COBIT to COSO

The Sarbanes-Oxley Act (SOX) requires publicly traded companies to declare and adopt a framework that the business will use to “define and assess internal controls.” In response, most publicly traded companies have adopted one of two frameworks that meet the SOX requirements: the Committee of Sponsoring Organizations (COSO) internal control framework and the IT Governance Institute’s Control Objectives for Information and Related Technology (COBIT).

How to Operationalize Vulnerability Threat Intelligence

With so many vulnerabilities to address and potential threats looming, how can organizations prioritize and respond effectively? Enter Vulnerability Threat Intelligence (VTI). This knowledge not only aids in pinpointing vulnerabilities but also shapes strategies for risk acceptance and rapid responses to zero-day threats. Join our webinar where Patrick Garrity from Nucleus Security, Caleb Hoch from Google, and Jared Semrau from Mandiant, uncover how to effectively leverage vulnerability threat intelligence (VTI).

The New Normal For Cybersecurity Practitioners

Former UBER CSO Joe Sullivan joined SecurityScorecard CEO Aleksandr Yampolskiy to discuss pressing topics on the mind of every CISO. Are we on the verge of entering the "Golden Era" of cybersecurity? SecurityScorecard is the global leader in cybersecurity ratings and the only service with over 12 million companies continuously rated. The company is headquartered in New York and operates in 64 countries around the globe.

Applying the Churchill Knowledge Audit to Cybersecurity

When FedEx founder Fred Smith attended Yale in the mid-1960s, he wrote an economics paper describing the concept of overnight delivery of packages by air. His professor infamously gave him a “C” grade because he viewed it as implausible. But Smith knew something his professor didn’t—and it was an idea that would change the way the business world worked forever. I bring this story up for two reasons. For one thing, I worked for FedEx and learned a lot from my time there.

When Hackers Get Hacked: A Cybersecurity Triumph

In a dramatic twist befitting a digital thriller, a malware analyst at SecurityScorecard turned the tables on cybercriminals, rescuing a company from a staggering $500,000 ransomware demand. This story isn’t just about a single incident; it’s a testament to the power of cybersecurity expertise in the ongoing battle against ransomware, a menace that recorded 493 million instances in 2022 alone.

What Are the Benefits of Cloud Adoption in Insurance?

The rise of cloud computing has been one of the most transformative technologies of the past several decades. According to research firm Gartner, public cloud services spending will increase from $313 billion in 2020 to $482 billion in 2022. Further, by 2026, it will exceed 45 percent of all enterprise IT spending, up from less than 17 percent in 2021. There’s no doubt that cloud adoption will continue to increase.

5 Steps to Ramp and Scale Your GRC Program

Acknowledging the invaluable role of spreadsheets in managing Governance, Risk, and Compliance (GRC) tasks over the years is like tipping our hats to a steadfast companion. These trusty tools have been the go-to for many organizations, embedded so deeply that a 2020 Forrester Research study revealed that 82 percent still rely on spreadsheets for handling third-party risk. And undeniably, they’ve served their purpose to a certain point.