Featured Blog
Online Extortion Is the New Ransomware: Why Hackers Just Want Your Data
“It’s MUCH easier to steal data and threaten to leak it to the world, than to go to all the trouble of developing and deploying ransomware,” shared Matt Durrin, director of research and training for LMG Security. Attackers are increasingly bypassing encryption altogether and going straight for your data. Instead of locking down systems, they’re […]
Cybersecurity Planning, Risk Assessments
How to Ensure Your Cybersecurity Risk Assessment Results are Actionable
Cybersecurity Planning, Risk Assessments
How to Measure Cybersecurity Risk: The Secret to Getting the Maximum Value From a Risk Assessment
Pen Testing, Web application security
Why Web Application Security Assessments Should Move Up Your To-Do List
Partnerships, Security contols, Security Controls Reports, Supply Chain Cybersecurity, Tabletop Exercises, Third Party Risk Management
Our Q3 2024 Top Control is Third Party Risk Management: Lessons from the CrowdStrike Outage
Risk Assessments, Supply Chain Cybersecurity, Third Party Risk Management, Vendor Risk Management
9 Tips to Streamline Your Vendor Risk Management Program
Business email compromise, Social Engineering
Social Engineering Scams: Cross-Tenant Impersonation Attacks, Voice Cloning Risks, and More
Compliance, Cybersecurity Planning, NIST CSF
Governance, Supply Chain, & Risk Management, Oh My! Understanding the New NIST CSF 2.0 Draft Guideline Changes
Cybersecurity, Cybersecurity Planning