Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Communicating Cyber Risk to Executives and Boards with Shamane Tan

In this episode of Cyber Security Decoded from Rubrik Zero Labs, host Steve Stone is joined by Chief Growth Officer at Sekuro and Best-Selling Author Shamane Tan to discuss differences in the cybersecurity landscape between the US and APAC, communication strategies for CISOs, building trust for better cybersecurity outcomes, improving organizational resilience, and diversity in the cybersecurity field.

Tackling Shadow IT Head-On: Strategies for Cybersecurity Leaders

As cybersecurity leaders, we're all too familiar with the challenges posed by Shadow IT—a persistent thorn in the side of IT and security teams worldwide. And when high-profile supply chain attacks make headlines, the urgency to understand our reliance on third parties becomes all too real.

Visualizing Vulnerability Management: What Does a Single Pane of Glass Really Look Like?

Single Pane of Glass (SPOG) is a common buzzword that sends shivers down the spines of technical folks everywhere. Yet, executive teams ask for it, especially in vulnerability management. At the same time, the complex and fragmented nature of modern IT environments wreaks havoc on organizations aiming to understand their current location related to remediating and patching risks. So, what exactly is a single pane of glass, and what does it look like for enterprises today?

Data-driven Strategies for Effective Application Risk Management in 2024

Insecure software is significantly impacting our world. In a recent statement, CISA Director Jen Easterly declared: “Features and speed to market have been prioritized against security, leaving our nation vulnerable to cyber invasion. That has to stop... We are at a critical juncture for our national security.”

Bitsight Vendor Risk Management Walkthrough

Streamline Assessments, Monitor Vendors, and Validate Security Posture with Ease. No more manual workflows or toggling between tools—with Bitsight VRM, part of the industry’s first end-to-end third-party risk management solution, you can effortlessly navigate through risk assessments and continuous monitoring with just a flip of a switch. Discover a new level of clarity and efficiency with instant access to an ever-growing network of 40,000+ vendor profiles. Track onboarding and validate questionnaire responses with objective data to make informed decisions and expedite risk mitigation.

SecurityScorecard 2024 Global Third-Party Cybersecurity Breach Report: Software supply chain is top target for ransomware groups

The SecurityScorecard Global Third-Party Breach Report uses the world’s largest proprietary risk and threat dataset to provide unique insights into the intricate web of supply chain vulnerabilities exploited by ransomware groups. As the digital landscape continues to evolve, so too do the tactics of cyber adversaries. Ransomware groups, in particular, have honed in on a prime target: the software supply chain.

Top 10 Digital Risk Protection Software Solutions

It’s no longer a question of ‘if’, but ‘when’ and ‘how’ cyber threats will target an organization. This reality demands a proactive approach to digital security. Recent data shows that over 85% of organizations have experienced a cyber attack supporting this need for vigilance. These incidents range from data breaches to brand impersonation, each carrying significant risks to business integrity and continuity.

Obrela Achieves NCSC CIR Level 2 Assure Service Provider Status , Demonstrating Commitment to Cybersecurity Excellence

Obrela proudly announces it has been awarded the National Cyber Security Centre (NCSC) Cyber Incident Response (CIR) Level 2 Assured Service Provider status issued by CREST. This underscores Obrela's unwavering dedication to maintaining the highest standards of cybersecurity readiness and incident response capabilities.

Hunting PrivateLoader: The malware behind InstallsKey PPI service

Since July 2022, Bitsight has been tracking PrivateLoader, the widespread malware downloader behind the Russian Pay-Per-Install (PPI) service called InstallsKey. At the time, this malware was powering the now decommissioned ruzki PPI service. Figure 1 presents a brief description of the service, which was found in their sales telegram channel. Fig. 1 - Service description on telegram channel profile (Russian and English).

Risk Management Essentials: How to Operationalize Risk Reporting

This virtual workshop delves into the core of risk management reporting. Led by our panel of industry experts, this session will equip you with the essential skills to not only analyze and report on organizational risks, but also communicate them effectively to leadership teams. Discover how to construct a robust reporting framework and master the art of presenting metrics with finesse.