Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

5 Predictions About Managing Software Risks in 2025

How does the exponential advancement of technology impact the security landscape? It makes managing the fundamental risk of the technology, the software, exponentially more complex. From AI accelerating risky code production to cloud infrastructure increasing the attack surface, the world of application risk management is enduring a rapid transformation that needs immediate attention.

Achieve Enhanced Risk Visibility With Keeper's Risk Management Dashboard

Keeper Security’s Risk Management Dashboard delivers a streamlined view within the Keeper Admin Console to quickly and easily give administrators visibility into their organization’s Keeper configuration practices and compliance posture. The Risk Management Dashboard leverages an outlined set of Keeper Security Benchmarks to keep organizations compliant and safe.

Grow Your MSP Practice with SecurityScorecard MAX

Managing vendor security is a growing challenge for MSPs. Clients expect you to deliver enterprise-grade protection across their entire supply chain. However, many struggle with limited resources, manual processes, and the complexity of addressing third-party risks. SecurityScorecard MAX turns this challenge into an opportunity, helping you protect your clients while driving recurring revenue for your business.

Risky Business: Working with Third Parties Across the Globe

To show regional differences, BlueVoyant’s latest research report includes C-level executive responses from organizations in the U.S. and Canada, U.K., Continental Europe, and APAC. Singapore had among the lowest reported negative impacts from third-party cyber breaches, while the U.K. had the most. Regional differences play a notable role in shaping how organizations approach and handle third-party cyber risk management (TPRM).

PROXY.AM Powered by Socks5Systemz Botnet

A year ago, Bitsight TRACE published a blog post on Socks55Systemz,a proxy malware with minimal mentions in the threat intelligence community at the time. In that post, we correlated a Telegram user to the botnet operation and estimated its size at around 10,000 compromised systems. After a year-long investigation, we are shedding new light on these conclusions.

CRQ Model Update Increases Statistical Significance With 25,000 Trials

As a part of its ongoing commitment to providing chief information security officers (CISOs) with practicable insights that guide high-level cyber risk management decision-making, Kovrr's latest model update increases the number of yearly trials in its Monte Carlo simulation by 150%.

How to Conduct a Risk Assessment for Your Disaster Recovery Playbook

Risk management is at the heart of any effective disaster recovery (DR) plan or playbook. No business is immune to disruptions, whether from natural disasters, cyberattacks, or technical failures. The question isn’t if, but when these threats will materialize. A proactive approach to risk management allows businesses to identify, assess, and mitigate these threats before they can bring operations to a standstill.

Everything You Need to Know About Shadow IT

Shadow IT refers to the use of information technology systems, devices, software, applications, and services without explicit approval from an organisation's IT department. While it sounds sinister, and has certain implications, it is not always done maliciously or with the intent of breaching security. It encompasses a wide range of digital activities where employees leverage unapproved tools to be more productive or achieve specific goals.

Securing Remote Access: Best Practices for Third-Party Risk Management

The physical location of users has become less and less important in conducting business, with the drawback that it creates new, persistent threats to organizations. You know that. You may not know that remote access to IT and business-critical systems is not a new concept. It’s been around since the late 1980s.