Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SecurityScorecard's Weekly Brief: The CISO Edition with Steve Cobb

This is SecurityScorecard's Weekly Brief: The CISO Edition with SecurityScorecard's CISO Steve Cobb. Is it time to retire the vendor questionnaire and annual assessment routines? Not quite, but following face-to-face customer interactions and many forward-thinking speaking sessions at RSAC 2026, CISO Steve Cobb emphasizes the importance of reducing risk for TPRM programs, which is not achieved by completing a third-party risk assessment checklist alone.

File Recovery from VM Backup with NAKIVO

When it comes to recovery from backups, one of the core functionalities needed is recovering a file or files that may have been accidentally or intentionally deleted, corrupted by a system failure, or a possible ransomware infection. When it comes to file recovery, we want to be able to quickly and easily recover from a backup and have the flexibility to choose the restore points we need.

How Armature Systems Uses Tines to Transform Our SOC Into a Faster, Leaner, Low-Friction Machine

Security operations often feel like a paradox: a discipline built on high-speed decision-making wrapped inside layers of noisy, inconsistent data. Every alert has some useful and not so useful noise, but only a few truly matter. Our job is to know the difference. For us, Tines became the medium through which the noise resolved into signal.

Outbound Email Security: Protecting Data and Reputation

Email security often focuses on incoming threats such as phishing, malware, and malicious links, but outbound email security is just as important. According to KnowBe4’s 2025 State of Human Risk Report, nearly half of cybersecurity leaders say misdirected emails sent by employees have caused security incidents. These mistakes typically happen when employees send messages to the wrong recipient, attach the wrong file, or unintentionally share sensitive information.

Offensive Security Testing: A Realistic Guide by Experts

There is a widening gap between what most organizations call offensive security testing and what actually keeps them safe. The standard model looks familiar: schedule an annual penetration test, receive a PDF full of color-coded findings, remediate a handful of critical items, and repeat next year. Attackers do not operate in annual cycles. The core problem is not a lack of testing. It is the wrong kind.

CMMC Requirements for AI Systems: What Assessors Actually Look For

Josh Rector is the Compliance Director, Public Sector at Ace of Cloud, a security and compliance consulting firm, certified CMMC Third-Party Assessor Organization (C3PAO), and Registered Provider Organization (RPO). With more than a decade of experience in cybersecurity compliance, he has worked both sides of the assessment table, leading internal and external assessments, serving as ISSO for systems at federal agencies, and guiding cloud service providers through the FedRAMP authorization process.