Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Practitioner's Corner: Managing Hidden Risk and Shadow IT

When it comes to managing hidden risk and shadow IT, our primary challenge as cybersecurity practitioners is securing the organization’s data and applications while empowering users to perform their duties efficiently. After all, one survey found that 67% of employees aren’t completely satisfied with their workplace tools and technologies—often resulting in the adoption of unsanctioned applications.

Hacker Subcultures: Unmasking the Motivations and Methods

The world of cybersecurity is vast and teeming with a wide array of hackers who possess distinct motivations, objectives, and methods. Unfortunately, public awareness of these differences is nearly non-existent. Some individuals employ their skills for noble purposes, while others are driven by malicious intent. Let’s delve into several subcultures within the realm of hackers, exploring their unique characteristics and their roles in shaping the cybersecurity landscape.

Bolstering Cyber Resilience in the US Water Sector: A Call to Action

Tomorrow, February 6, 2024, the House Homeland Security Committee will hold a hearing on securing US water systems from cyberattacks. Following last year’s widely publicized attack on the municipal water system in Aliquippa, Pennsylvania, Congress, the Cybersecurity and Infrastructure Security Agency (CISA), and industry leaders have rightly increased their focus on the unique risks facing water systems across the country.

Protecting Student-Athlete Data: TPRM for Collegiate Athletics

American college athletics is a foundational pillar of higher education institutions and a profitable business model for universities. The National Collegiate Athletic Association (NCAA), which regulates college athletics, reported that in 2020, Division I schools earned $15.7 billion in athletics revenue. In 2023, NCAA Division I school Ohio State University reported a record-breaking revenue of over $275 million from its athletic department alone.

From Confusion to Clarity: Red Sift Breaks Down Google and Yahoo's Email Security Requirements

Many people around the world right now are confused as to whether their organization is ready for Google and Yahoo’s new requirements for bulk senders. So don’t worry, you’re not alone. Back in October the announcement was made that there would be consequences for organizations sending more than 5,000 emails a day who didn’t have their email security in order. But what are the consequences? And who really needs to worry?

Decoding Cyber Security Innovations with SecurityScorecard CEO Alex Yampolskiy

As part of a multi-part series with NightDragon, Nasdaq, and J.P. Morgan, SecurityScorecard founder and CEO Dr. Aleksandr Yampolskiy sat down with NightDragon CEO Dave DeWalt and unveiled his deep-rooted passion for cybersecurity. Tracing back to an early encounter with a computer virus as a child, Yampolskiy discusses how this pivotal moment sparked an enduring curiosity, driving him toward a distinguished academic path.

Nucleus Product Update 4.1

Welcome to the Nucleus Product Update 4.1. It’s a new year with new things to get excited about together. Here’s to making 2024 a great one! 🥳 This update outlines lots of Nucleus happenings you don’t want to miss, including: We’re also including a link to our latest webinars, which are value-packed sessions you don’t want to miss. Get the details for all updates below.

Practitioner's Corner: Turning Regulatory Compliance into Strategic Opportunity

Cyber risk regulations like NIS2 and DORA in the EU, or PS21/3 in the UK, signal a seismic shift toward strengthening cyber resilience and enforcing accountability. Championing regulations is not just a matter of checking compliance boxes: it’s an opportunity to become a business leader. To enable growth and protect revenue.

What Are the Similarities and Differences Between FISMA vs. FedRAMP Certification?

The U.S. federal government has many laws and regulations intended to assure strong cybersecurity for government agencies. Two of the most important are the Federal Information Security Management Act (FISMA) and the Federal Risk and Authorization Management Program (FedRAMP). Both FISMA and FedRAMP have the same fundamental goal: to assure that federal agencies and their vendors protect government data. That said, they also differ in many ways.

Building a Scalable Third Party Risk Management Framework

In an increasingly interconnected business world, companies are relying more and more on third parties like vendors, suppliers, contractors, and partners to support critical operations and functions. While these third party relationships can provide significant strategic benefits, they also introduce risks that must be managed across the enterprise. Organizations need to implement comprehensive programs to identify, assess, and mitigate the cyber, financial, reputational, and compliance risks associated with supplier and vendor ecosystems.