Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Build a Cyber Resilient Framework

Cyber attacks aren’t just on the rise; they are skyrocketing. Incidents of ransomware alone nearly doubled last year. A new study by CrowdStrike finds that ransomware-related data leaks increased by 82% in 2021. Furthermore, ransom demands now average $6.1 million per incident, a 36% increase from 2020. Clearly, reacting to and remediating security threats when they arise is not going to cut it anymore.

Don't Manage Third-Party Risk Alone

New research from the Cyentia Institute found that 98% of organizations do business with a third party that has suffered a breach. The report also found that the average firm has 11 third-party relationships and hundreds of indirect fourth- and nth-party relationships. Bottom line: an expanding attack surface makes companies more prone to cyberattacks.

What is Zero Trust? Everything You Need to Know to Secure Vendor Access

Zero trust is a cybersecurity approach that restricts network access so only the right people are accessing the specific information they need —and nothing more. Here’s everything you need to know about the basic principles of Zero Trust and how to apply them to your third-party risk management program (TPRM) to create more secure remote access connections.

Risk Management is a Team Sport with Emilio Escobar

Datadog's Chief Information Security Officer, Emilio Escobar, discusses how organizations are reducing silos between devops and security teams in order to effectively manage security risks. In order to provide secure defaults, decentralized security, and rapid response to security events with deep context, Datadog embeds security at all different levels and scales its program by utilizing security ambassadors and engineers.

Password Security: How To Protect Credentials Across Your Supply Chain

Many major stories about cyberattacks or data breaches have one weak link in common: passwords. Oftentimes, the simple alphanumeric password that acts as gatekeeper to our personal phones and email accounts is the same one that protects enterprise businesses’ servers. And passwords are only as strong as we make them. Unfortunately, though, most employees—76 percent of Americans, according to research we conducted in 2022—never change their passwords, or only do so when forced to.

How cybersecurity's "5 Percent Rule" could help you avoid the next cyber attack

It’s not easy being a cybersecurity leader these days. Security vulnerabilities in software, hardware, and devices are rising in number and severity, bringing with them risk of ransomware, breach, and other dangerous cybersecurity incidents. The risks presented by vulnerabilities are rising fast: Here’s the important question: With cyber vulnerabilities rising and presenting increasingly serious risks, are organizations doing enough to fight back? The answer might surprise you.

Obrela at Delphi Forum || Panel Discussion

George S Daglas, Vice President, Chief of Strategy & Customer Success Officer, at Obrela participated on 28 April in the panel discussion on #cybersecurity in Greece powered by the findings of a brand new research by Metron Analysis S.A. at Delphi Forum with the kind support of Vodafone. We had the opportunity to discuss the key concerns about the security of #data and #cybersecuritytrends both in Greece and abroad deriving from our international experience and how to best action next steps for businesses and users.

Shine a Light on Shadow IT: Vanta Launches Category-First Vendor Risk Management Solution

Delivering a single platform to assess vendor risk, automate security reviews and remediate issues. Supercharged Access Reviews ensure the right users have access to the right systems. AI-powered Questionnaire Automation increases accuracy and reduces time-intensive tasks.

AI, Cybersecurity, and Emerging Regulations

The SecurityScorecard team has just returned from an exciting week in San Francisco at RSA Conference 2023. This year’s theme, “Stronger Together,” was meant to encourage collaboration and remind attendees that when it comes to cybersecurity, no one goes it alone. Building on each other’s diverse knowledge and skills is what creates breakthroughs.

Cybersecurity Risk Mitigation: Understanding the Limitations of Reducing a £2 Million Risk

We discuss a scenario where a £2 million risk can potentially be mitigated to £100,000 through a £50,000 investment. However, it's crucial to comprehend the inherent limitations of risk reduction in the cybersecurity realm. As seasoned cybersecurity professionals, we acknowledge that no company, solution, or defense mechanism can guarantee 100% protection against emerging threats. Stay updated and empowered with the latest insights to safeguard your digital assets effectively.