Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

July 2022

How to defend against third party cyber-attacks

In this blog post, we discuss the different types of challenges that third party relationships present and outline specific ways to defend against them. Third party risk is created when companies in an organisation’s supply chain have access to its data, systems or privileged information. This can lead to issues such as data breaches, IP theft or other security incidents. Organisations can be held accountable for security breaches even if they originate from a third party.

Q2 2022 Threat Landscape Briefing: Ransomware Returns, Healthcare Hit

In Q2 2022, Kroll observed a 90% increase in attacks against the health care sector in comparison with Q1 2022, making it the most affected sector during this period. While this may signal the official end of the pandemic-era “truce” that many cybercriminals promised at the onset of COVID-19, threat actors are continuing to leverage other hallmarks of the pandemic, such as remote work access, to gain a foothold into victim networks.

NIST updates guidance on supply chain risk

The National Institute of Standards and Technology (NIST) recently updated its guidance to offer support for key practices and approaches involved in successful cyber security supply chain risk management (C-SCRM). In this blog post, we provide an overview of the update and what it means for organisations.