Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Kroll: How Will Recent SEC Scrutiny Impact the Viability and Valuation of SPACs?

Over the past three decades, special purpose acquisition companies (SPACs) have been an investment vehicle that has flown generally under the radar. However, from the second half of 2020, through early April of 2021, the number of new SPAC IPOs and related acquisitions increased at a frenzied pace, with more proceeds raised in SPAC IPO's during this period than the preceding 10 years combined. On April 12, 2021 the SEC issued a statement highlighting that the accounting for SPAC warrants as equity rather than debt may need to be reconsidered.

Kroll's 2021 Anti-Bribery and Corruption Benchmarking Report

Join Kroll for a webinar detailing the key findings from our soon-to-be released 2021 Anti-Bribery and Corruption (ABC) Benchmarking Report, which is based on a survey of 200 senior professionals from around the world. One year into the pandemic, we regarded this as an especially opportune time to understand and evaluate strengths, weaknesses and emerging trends in ABC programs.

Kroll: How to Use KAPE and SQLECmd with EventTranscript.db

EventTranscript.db , a recently discovered Windows 10+ artifact, can track and maintain a wealth of artifacts and data elements. Kroll's Andrew Rathbun and Josh Mitchell found that Kroll Artifact Parser and Extractor (KAPE), leveraging the EventTranscriptDB Target and SQLECmd Module, will collect the database from any Windows 10+ system if the database is enabled and parse it accordingly.

Kroll: Lunch & Learn: Navigating Increased Transactional Risk Scrutiny

The list and severity of risks that can affect a transaction continue to grow, with cyber becoming an alarmingly difficult challenge for firms of all sizes. With tighter scrutiny around Regulations S-P and S-ID, a variety of disclosure obligations and new encrypted messaging apps, conducting proper cyber due diligence is imperative. However, will cyber diligence slow the deal? What are the implications for taking shortcuts?

Kroll: Making the Most of Digital Risk Protection in Today's Threat Landscape

Hosted by Kroll and Redscan cyber risk experts, this webcast will address digital risk protection (DRP) and share impactful use cases for today's threat landscape. Often classified as "dark web monitoring," DRP can be merged with cyber threat intelligence services to not only track threats but take action against threats happening outside of your network. Examples of such include, but are not limited to social media platforms, forums, domain registrations and account takeovers.

Kroll: 10 Essential Cyber Security Controls for Increased Resilience and Better Insurance Coverage

While threat actors continue to vary attack methods, these 10 essential cyber security controls can significantly improve your security posture, therefore making it harder for cybercriminals to compromise your network and increasing your opportunities for cyber insurance coverage. Validated by our seasoned cyber security experts based on frontline expertise and with a thorough review of the expanded questionnaires now requested by most cyber insurance carriers, this session will present key takeaways for each of the controls and their real-life effectiveness.

The Best Way to Prevent Getting Hacked

Here are simple cyber hygiene practices to get ahead of 95% of companies: Hackers today have tools that can find 1000s of easy targets that have bad cyber hygiene with a single click. Here’s an analogy: Imagine you’re a burglar walking in a neighborhood, thinking which house to break-in. While all the houses look perfect, there is one that looks abandoned with broken doors, an unkempt lawn, and graffiti on the wall.

GDPR Penetration Testing Services | Why You Need One Today?

As the deadline for GDPR compliance looms, many organizations are still unsure of what steps they need to take to become compliant. One important step that is often overlooked is penetration testing. In this video, we discuss the importance of penetration testing and why you need it today in order to become GDPR compliant.

What is a Whaling Attack (Whaling Phishing)? Definition & Examples

According to the FBI Internet Crime 2020 Report, phishing scams were the most prominent attack in 2020 with 241,342 complaints reported and adjusted losses of $54 million. In particular, whaling (a highly targeted phishing attack) has been on the rise and is only expected to grow from here. A whaling attack targets high-profile executives with access to valuable information and systems. Let’s take a closer look at whaling attacks and how to stay protected.