Report
Joint “CYPRES” Report on Incident Response Released by FERC
Earlier this month, the Federal Energy Regulatory Commission (FERC) published a joint report entitled “Cyber Planning Response and Recovery Study” (CYPRES) in partnership with the North American Electric Reliability Corporation (NERC) and ...
Effective Threat Intelligence Through Vulnerability Analysis
Vulnerabilities are weaknesses leveraged by adversaries to compromise the confidentiality, availability or integrity of a resource. The vulnerability ecosystem has matured considerably in the last few years. A significant amount of effort ...
The COVID-19 Pandemic Dominates the Cybersecurity World
Cybersecurity is not a static world. You can say that it is a social system, it affects and is affected by its surrounding environment. For example, back in 2018, it was the ...
As UK Data Breach Reports Drop, Britain’s Privacy Watchdog Reveals Surge in Other Cyber Incidents
The latest report from the UK’s Information Commissioner’s Office (ICO), reveals a steady drop in data security incidents between January and March 2020. When comparing the first quarter of 2020 to the ...
Attacks Targeting ICS & OT Assets Grew 2000% Since 2018, Report Reveals
The digital threat landscape is always changing. This year is an excellent (albeit extreme) example. With the help of Dimensional Research, Tripwire found out that 58% of IT security professionals were more ...
Report: More Unknown Devices on Corporate Networks
A report published this week by Sepio Systems suggests the number of devices being attached to corporate networks since the start of the COVID-19 pandemic began has increased sharply. Sepio Systems, a ...
ManagedMethods 2019 State of K-12 Cybersecurity Infographic Reveals Cybersecurity Incidents Impacting School Districts Increased 185%
BOULDER, Colo.—March 3, 2020—ManagedMethods, a leading Google G Suite and Microsoft Office 365 data security and student safety platform for K-12 school districts, today released its State of K-12 Cybersecurity infographic, in ...
The Statement of Applicability in ISO 27001
The SoA (Statement of Applicability) is one of the key documents when it comes to ISO 27001 compliance. It identifies the controls you have selected to address information security risks, explains why ...
WhiteHat Report: DevSecOps Adoption on the Rise
More organizations have embraced best DevSecOps practices, according to a report published by WhiteHat Security, a subsidiary of NTT Security focused on application security. However, the report also notes that although more ...
Security a Challenge in Digital Transformation
Most organizations are now engaged in some form of digital transformation project or initiative, but security is a top concern for firms as they invest in new technology to grow business. This ...

