Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Robustness vs Resilience in Cybersecurity

Our cybersecurity architectures need to be resilient, not robust. Let’s understand with an example: Egyptian pyramids are robust. They have stood the test of time for 1000s of years. But they're not resilient. If you blow one up with dynamite, it will explode. On the other hand, a coral reef is resilient. If you break off a part of it, it regenerates itself. Similarly, in cybersecurity, we need to have the mindset of resilience, recovery, and recuperation.

Common Mistakes Chief Security Officers Make

Here are 3 common mistakes chief security officers (CSO) make: Not prioritizing risks: Certain things might feel risky, but they’re not, while certain other things might feel safe, but they’re risky. Example: A turbulent flight feels dangerous but is often not, whereas passive smoking might feel safe but is highly risky. A good CSO can differentiate between what “feels” risky and actual risk. This allows them to prioritize and mitigate risks effectively. Not alternating between business and technical hats.

The Best Way to Prevent Getting Hacked

Here are simple cyber hygiene practices to get ahead of 95% of companies: Hackers today have tools that can find 1000s of easy targets that have bad cyber hygiene with a single click. Here’s an analogy: Imagine you’re a burglar walking in a neighborhood, thinking which house to break-in. While all the houses look perfect, there is one that looks abandoned with broken doors, an unkempt lawn, and graffiti on the wall.

What Is Cyber Hygiene?

The hackers succeed because they know your attack surface better than you do. - Rob Joyce. For example, a lot of times, companies spin up a QA server and then forget about it, which then becomes an easy target for hackers to break into the company. Companies need to maintain a good cyber hygiene by taking care of the basics. An example of a bad cyber hygiene is a website that shows Copyright 2010 in 2022.

The Lightbulb Moment for SecurityScorecard

“Alex, I don’t think you are doing a good job,” said the chairman as I presented my progress. I was shocked. At that time, I was working as the Chief Security Officer at Gilt Groupe. He continued, “...because people aren’t complaining. If you were making enough changes, I’d hear more people complaining about you.” It was this ironic moment that gave birth to SecurityScorecard as I realized that companies have no KPIs to know how they’re doing on the cybersecurity front.

SecurityScorecard Acquires LIFARS; Empowers Orgs w/ View of Cyber Risk & Path to Cyber Resilience

Watch a video message from Aleksandr Yampolskiy, SecurityScorecard CEO & Co-Founder and Ondrej Krehel, LIFARS' CEO & Founder, about the customer benefits of this winning combination.

365 Breaches Anticipated in 2021 and How Predictions Can Protect Your Firm in 2022

What would you do, if you could predict a data breach? In this webinar recording, Penguin, Sainsbury’s, Tesco, and others will show how they use SecurityScorecard to predict and prevent data breaches. They will explain how they engage with their subsidiaries and suppliers, showing you how hundreds of breaches have been predicted in 2021 and what that means for 2022.

SecurityScorecard CISO Mike Wilkes talks about 2022 Cybersecurity Predictions

There's never been a more important time to strengthen your cybersecurity posture. Hear what SecurityScorecard's Chief Information Security Officer, Mike Wilkes, has to say about 2022 Cybersecurity Predictions. He'll also share key ways you can improve your cyber posture going into the new year.