Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Competing with ZenGRC: A Look at the Market's Top Players

In the evolving landscape of governance, risk management, and compliance (GRC) management, organizations increasingly rely on sophisticated software to navigate regulatory environments and mitigate risks. Among these solutions ZenGRC has emerged as a prominent player, but it does operate in a competitive market with capable alternatives.

Using TPRM to Protect Intellectual Property in University Research

University-industry collaborations and other joint research ventures offer access to resources, expertise, funding, and other benefits for university researchers. However, through the use of unvetted software, password sharing, and other actions these external partnerships can expose the university and its intellectual assets to substantial cybersecurity threats, such as unauthorized access, data breaches, and other cyber attacks.

In-House vs Outsourced Third-Party Risk Management

Today’s cybersecurity landscape is teeming with third-party threats: supply chain risks, regulatory compliance requirements, third-party security flaws, malicious insiders, and more. Whether your organization’s risk appetite craves conservative or aggressive third-party relationships, these risks make third-party risk management (TPRM) necessary.

TPRM & FINRA Compliance: Regulatory Notice 21-29

The United States Congress first authorized the Financial Industry Regulatory Authority (FINRA) to protect American investors and oversee the broker-dealer industry in 2007. FINRA is an independent regulatory organization that upholds its obligation and ensures a fair market by establishing rules to regulate business activities and improve the security of member firms and other market participants. With few exceptions, most broker-dealer firms must register with FINRA.

5 Cyber Governance Tips for Board Members, Inspired by New Bitsight-Google Study

Cybersecurity has become a critical part of corporate governance, with board members increasingly held accountable for the digital safety of their organizations. Amid rising breach costs, new cybersecurity regulations like those from the U.S. Securities and Exchange Commission (SEC), and new studies finding widespread cybersecurity failures, the impact of board-level cyber governance decisions is significant.

Transforming Cybersecurity Risk Assessments Into Actionable Plans With CRQ

‍Market success has often demanded that business leaders take risks. Some of the most profitable executives are those who have pursued bold initiatives, recognizing, despite the dangers, the potential rewards. However, as organizations grow and become more complex, the costs of these risks rise, demanding a more data-driven approach to its management.

Navigating the Future of AI Governance: A Guide to NIST AI RMF, ISO/IEC 42001, and the EU AI Act

In the rapidly evolving landscape of artificial intelligence (AI), governance, risk, and compliance (GRC) professionals somehow need to navigate the increasingly complex challenges of trustworthy development, deployment, and monitoring of AI systems.

National Cyber Security Centre (NCSC) Vulnerability Management Guidance Checklist

As of February 12, 2024, the National Cyber Security Centre (NCSC) has released Version 2.0 of its vulnerability management guidance. This update provides organizations with the latest strategies and practices to identify, assess, and manage cybersecurity vulnerabilities effectively. The NCSC’s updated guidance on vulnerability management outlines the importance of proactively managing vulnerabilities to secure technical estates.

What is the Zero Trust Security Model?

Traditional security paradigms are increasingly falling short against sophisticated cyber threats in the dynamic and challenging cybersecurity landscape. This has led organizations to adopt the zero-trust security model, a paradigm shift that assumes no internal or external entity is to be trusted without verification.

Love in the Time of Cyber Threats: Romance Scams and Dating App Cybersecurity

As the digital attack surface expands, organizations and individuals worldwide face the nonstop threat of cyberattacks, phishing scams, and other cyber vulnerabilities. And with Valentine’s Day here, romance scams — especially ones originating online — are intensifying. With that in mind, SecurityScorecard’s researchers took a close look at the world of dating app security and romance scams to protect people—and their hearts—during Valentine’s Day.