CISO Suite

CISO Suite

Fostering Cyber Transparency with Richard Horne

Cyber Transparency: Shining a Light on Security

Jamie Cowper, VP of Marketing had the opportunity to sit down with Richard Horne, a distinguished member of the Noetic Advisory Board. Together, they discussed the challenges confronting organizations in the ever-evolving ...

CSBR Slams Microsoft Over Storm-0558 Attacks | Key Insight

In recent news, the U.S. Cyber Safety Review Board (CSBR) has raised concerns over Microsoft’s handling of the Storm-0558 attacks, highlighting significant security lapses that allowed a China-based nation-state group to breach ...
Seal of the Cybersecurity & Infrastructure Security Agency

Sisense Hacked: CISA Warns Customers at Risk

A hard-coded credential catastrophe: The analytics firm kept big companies’ secrets in an insecure AWS bucket. Government says victims include the “critical infrastructure sector.” ...
Security Boulevard
Defining Cyber Resilience with Richard Horne

Cyber Resilience: Meeting the New Standard in Security

We sat down with Richard Horne, Noetic Advisory Board Member to explore the major issues that organizations face in the dynamic realm of cybersecurity. Richard, who spends much of his time strategizing ...
Streamlining Third-Party Risk Management: The Top Findings from the 2024 Benchmark Survey Report

Streamlining Third-Party Risk Management: The Top Findings from the 2024 Benchmark Survey Report

As businesses grow and expand their operations, their third-party risk management program grows with them. This growth leads to increased complexity that makes it challenging for GRC and IT professionals to effectively ...

Quantifying Confidence: How Risk Quantification Transforms SAP Decision-Making

Navigating SAP risks can feel like traversing a minefield blindfolded. You know threats exist, but understanding their potential impact and prioritizing responses often feels like fumbling in the dark. Enter Risk Quantification, ...

Cyber Risk Management: A Beginner’s Guide

With the emergence of new cybersecurity regulations like the SEC’s incident disclosure rules and the EU’s NIS2 Directive, much attention is directed towards understanding and complying with these new incident reporting requirements ...
governance

Cybersecurity Infrastructure Investment Crashes and Burns Without Governance

Just like pilot awareness is crucial during unexpected aviation events, cybersecurity's traditional focus on infrastructure needs to shift to more adept governance ...
Security Boulevard
2024 IT Risk and Compliance Benchmark Report Findings: Why Unifying Risk and Compliance Work Is No Longer Optional

2024 IT Risk and Compliance Benchmark Report Findings: Why Unifying Risk and Compliance Work Is No Longer Optional

Each year, we ask over 1,000 IT and GRC professionals about their priorities for the coming year and operational aspects, like changes to budgets, staffing, challenges, and much more. What we found ...

Get Clean, Stay Clean, Optimize – The Cure for Distressed IGA Deployments

Gartner recently released a report titled “Avoid These Top 5 Mistakes When Deploying IGA” by analyst Brian Guthrie. In the report, Gartner estimates that 50% of IGA deployments are in “distress.” The ...