risk assessment
Silos Are the Enemy of Managing Security Risks, Keeping People Safe
This article was originally featured on SecurityInfoWatch.com This has been a watershed year for security. Hundreds of mass shootings across the United States, brutal attacks on public officials, and an increasingly complex threat landscape ...

Penetration Testing – Protecting your assets from cyber threats.
Introduction Pen testing is seen as a proactive cybersecurity measure because it calls for ongoing, self-initiated modifications depending on the test’s results. This is distinct from nonproactive strategies, which don’t address problems ...

How to Adapt to Tightening Security Budgets
Cybersecurity is not immune to inflation. As Orion Hindawi, CEO and co-founder of Tanium told the audience at Converge 2022, security teams are being told by their CFOs that they must justify ...

AuditBoard Adds Ability to Assess Third-Party Risk
AuditBoard today announced the availability of a third-party risk management extension to its CrossComply platform for managing compliance requirements. Rajiv Makhijani, senior vice president for emerging products at AuditBoard, said as organizations ...

Risk Assessment: The Crucial Element Of A Successful Security Implementation Program
The advancement of technology leaves no scope for negligence when it comes to data protection. Organizations, understanding the urgency of the matter, implement sturdy cybersecurity practices in place, but can the appropriate ...
What Corporate Security Can Expect After the Uvalde and Buffalo Mass Shootings
In the past few weeks we have seen high-profile mass shootings in Buffalo, NY – at a Tops supermarket – and in Uvalde, TX – at Robb Elementary School. Although neither mass ...

Vulnerability, Threats, Exploits and their relationship with risk
Learn about vulnerability exploitation which is when an attacker uses certain techniques, pieces of code or methods to take advantage of an existing vulnerability and target the IT system. The post Vulnerability, ...

Top Things to Look for in DDoS Protection
The shift to the public cloud has resulted in applications being exposed to a larger attack surface and an expanding array of vulnerabilities. The post Top Things to Look for in DDoS ...

7 Things to Look for in a Cloud Security Service
The accelerated change of both web-assets and attack vectors renders static web security solutions obsolete. Security teams need a solution that meets the distinctive needs of their networks and applications while automatically ...

How Much is Your Data Worth?
Most organizations that prioritize and categorize data rarely assign it a specific monetary value. Usually, there is no need to go into that level of detail; it is enough to identify the ...