<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=26304&amp;fmt=gif">


Read about the latest cybersecurity news and get advice on vendor risk management, reporting to the board, managing cyber risks, benchmarking security performance, and more.

TaxSlayer Breach: Dissecting The Latest Cyberhack

Cyberhacks in the online tax software service and software realm have been extremely prevalent in the last year. In August of 2015, the Internal Revenue Service (IRS) revealed that hackers had gained access to sensitive information about...


Automotive Cybersecurity: A Sneak Peek At An RSA 2016 Presentation

Automotive cybersecurity wasn’t even thought about 15 years ago—but today, it’s a well-understood and critical problem. The crux of the issue is due to the fact that cars have hundreds of millions of lines of code, which are run by...


A Survival Guide To RSA 2016 For Vendor Risk Managers

The RSA conference—held annually in beautiful San Francisco—is one of the largest gatherings of security professionals in the world. (Last year’s conference hosted about 30,000 attendees!) This year, RSA will be held February 29-March 4;...


BitSight Insights: Risk Degrees of Separation

On October 15, 2015, UltraDNS experienced a technical issue that led to a widely publicized outage, bringing down websites for Netflix, Expedia, and others for over an hour. In a separate incident on April 8, 2015, Sendgrid, a cloud-based...


Locky ransomware, metrics and protection

Ransomware is a cash-in machine for criminals and we have just spotted another one come alive this week. Since 16th February, AnubisNetworks Labs team is tracking Locky, a malware that given the high volume of its distribution campaigns...


COBIT Vs. ITIL: Which Framework Works Best For Cybersecurity?

COBIT and ITIL are information technology management and IT governance frameworks, and both are popular around the world. They were created to provide management and guidance for IT services in businesses of all sizes.


Beyond Hurricanes: The 4th Party Side of Cyber Aggregate Risk

On August 24, 1992, Hurricane Andrew devastated South Florida and Louisiana, leaving a trail of destruction in its path. The estimated payout from insurance claims totaled $15.5 billion ($26.4 billion in 2015 dollars). Due to the...


3 Ways Using A Vendor Risk Assessment Template Alone Can Fail You

Vendor risk assessment templates are the starting block to creating vendor questionnaires. Typically, they’re comprised of a variety of questions, but the end goal for each is the same: to figure out how secure your vendor is.

Load More

Subscribe to get security news and updates in your inbox.