Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Risk Management

Cyber Risk Exposure: How to Act When You Can't Measure Risk

You can’t manage what you can’t measure – and unfortunately, measuring cyber risk exposure can be quite difficult. That’s not, of course, because no one attempts to put labels on risks and threats. In fact, there is a great deal of effort placed on identifying, quantifying, and deciding how to manage cyber risk.

UpGuard Summit September 2023 - Panel Discussion

Join our moderator Will Scott as he sits down with three of our knowledgeable customers, who share their best cybersecurity risk management practices. Guest Speakers Abhi Arora - Information Security Lead at Teneo Nomfundo Ndlanya - Group Governance, Risk & Compliance Manager at Coca-Cola Beverages Africa Thibault Millant - Information Security Officer at Scorpio Group.

Why Reduce Software Supply Chain Risks with Intelligent Software Security

There’s a growing array of risks lurking within the supply chain of the digital solutions we increasingly depend upon. Leaving gaps in your software supply chain security (SSCS) could spell disaster for your organization. Let’s explore how new analysis defines an end-to-end solution and why Veracode was ranked as an Overall Leader, Product Leader, Innovation Leader, and Market Leader in the Software Supply Chain Security Leadership Compass 2023 by KuppingerCole Analysts AG.

Using a Standardized Approach for Measuring Cybersecurity in Government

Last week at the annual Billington CyberSecurity Summit in Washington, DC, officials from government agencies gathered with industry leaders to discuss cyber threats, as well as geopolitics and issues of national security. One of the highlights was a fireside chat on Friday with Anne Neuberger, deputy national security adviser for cyber and emerging technology.

CIO Vs. CISO: Who Does What?

Every organization handles security differently, based on their needs and internal structure—but in some mid-sized and large companies, both the chief information officer (CIO) and the chief information security officer (CISO) are involved. This can set up a CIO vs. CISO standoff. Indeed, historically, the relationship between the CIO and CISO has been described as adversarial but ever-evolving.

The SEC's New Cybersecurity Regulations Part II: What Shareholders Should Know

It seems everyone is concerned about cybersecurity these days, and the investor community is no different. Shareholders are reading the headlines—ransomware attacks, data breaches, infrastructure disruptions—and they are wondering how these incidents could impact the companies that they invest in. Shareholders are about to get a lot more information from companies in the months ahead. In July 2023, the U.S.