Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SecurityScorecard

3 Key Trends in Today's It Security Landscape

Here are 3 trends contributing to global cyber insecurity: Today, you have digitization of information, the proliferation of OT and IoT devices, web 3, etc., leading to more vulnerabilities. There are also third-party risks that lead to 70% of breaches. We could be doing a great job protecting our company. But then we may send a document to a law firm that gets hacked, and all of a sudden, our sensitive information is out in the open.

Diagnosing Board Reporting and Its Challenges

Three-quarters of U.S. CEOs in PwC’s 24th Annual Global CEO Survey said they are “extremely concerned” about cyber threats. They want to understand roadblocks, cyber insurance coverages, and budget allocation, among other critical topics. CISOs prefer the language of technology, and boards prefer the language of finance.

Russian-Speaking Threat Actors Claim New DDoS Attacks Against U.S. Targets

Citing senior Cybersecurity and Infrastructure Security Agency (CISA) officials, journalistsreported on November 8 that DDoS attacks had temporarily disabled the website of a state government. A group claiming to be pro-Russian hacktivists, CyberArmyofRussia_Reborn, claimed responsibility for that attack and another on the website of a U.S. political party’s governing body on the same day, specifying one target IP address for each organization.

The Future of Digital Forensics: Challenges & Opportunities

With the rise in cybercrime, including malware and ransomware attacks, digital forensics has become vital for many organizations. Digital forensics is the science of recovering, investigating, and analyzing digital records, often called digital artifacts, or in legal language forensic artifacts. This can be to find evidence of a crime, but is more often used to identify activity occurring on a computer and to understand how a cyberattack or breach may have occurred.

SecurityScorecard Enables Cyber Insurers to Shift from Static to Dynamic Loss Control

It’s no secret that loss control programs are essential for cyber insurance. Unlike other forms of insurance where the risk and assets don’t change much during a policy term, cyber insurance is meant to mitigate a constantly evolving risk and cover organizations whose security posture is always changing. A cyber insurance policy could be priced completely differently today compared to a few weeks or months later.

How Patching Thwarts Cyber Attackers

At SecurityScorecard, we analyzed open vulnerabilities across the entire Internet. Here are some of our shocking discoveries: Furthermore, on average, it takes these organizations a year to fix 50% of the vulnerabilities. That's why hackers often have the upper hand. Solution? Build a mature program that: Got questions? Let me know in the comments below. SecurityScorecard is the global leader in cybersecurity ratings and the only service with over 12 million companies continuously rated. The company is headquartered in New York and operates in 64 countries around the globe.

How to Improve CISO & Board Member Communication

Here is how to establish successful 2-way communication between the board members and CISOs: Beating the learning curve If you’re a board member, it’s not considered okay if you show up to a meeting without knowing what’s EBITA. But it's perfectly acceptable for you to not know security, which is not good. So it’s your responsibility to educate yourself on cybersecurity. Similarly, CISOs need to learn to express technical things in business language. Seeing the CISO as a true business partner

What's the Difference Between Red Teaming and Penetration Testing?

When discussing cybersecurity, “penetration testing” and “red teaming” are two terms that are often used interchangeably but are two entirely separate concepts. If you are considering implementing additional cybersecurity protocols within your organization, it’s essential to understand the unique role and function of each of these processes and how they can benefit your organization.

SecurityScorecard Provides Comments to FERC's Proposed Risk-Based Cybersecurity Rulemaking

SecurityScorecard, the global leader in cybersecurity ratings, commented on the Federal Energy Regulatory Commission’s (FERC or “Commission”) proposal to establish rules for incentive-based rate treatments for certain voluntary cybersecurity investments by utilities. Cybersecurity is among the greatest threats to the resilience and reliability of America’s critical infrastructure, including its electricity infrastructure.

Key Cybersecurity Trends in 2023

Here are 3 key insights for 2023 I’ve gained after talking to dozens of CISOs and CIOs: Their budgets are not decreasing. Even though we see volatile and turbulent market conditions ahead, most CISOs’ budgets are not decreasing. It’s good news that the industry continues to thrive despite the economic headwinds. They are focusing on public and private sector collaborations. Many governments are amping up their security investments in light of the Ukraine conflict.