Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Moving Beyond the Cyber Risk Matrix With Defensible CRQ Data

‍ The use of risk matrices for decision-making purposes extends back to the 1980s when the US Department of Defense needed a quick and easy way to evaluate hazards in safety systems engineering. Since then, the matrix has been applied in multiple fields to assess potential results and their associated risks, emerging as an instrumental tool for organizations grappling with making high-level strategic investments. ‍

Software Liability Explained

Software liability is an increasingly important area for every software development company and team. At its core, software liability is about protecting users from damages caused by software issues. As more software is in use than ever before, there’s a lot of ways that software — and its manufacturers — could be held responsible for certain actions or inactions. Indeed, even the rise of cyber insecurity globally could fall into this murky area.

Exposed Server Headers and Cybersecurity Risk

Your web server conveys a variety of information to the client when a visitor opens your website. They can access specific policies you've set and sometimes identify what kind of software you use to run your system. Sometimes, that's okay. Other times, the information exposed in your server header can lead directly to a malicious cyber attack.

What are ESG Frameworks? Corporate Sustainability & ESG Risks

ESG frameworks are guidelines, metrics, and criteria that allow companies and investors to develop sustainability reporting standards and evaluate environmental, social, and governance risks. Common ESG frameworks include the Global Reporting Initiative (GRI), Carbon Disclosure Project (CDP), and Task Force on Climate-Related Financial Disclosures (TCFD). Over the last decade, ESG performance has become an important metric to evaluate an organization’s operational sustainability.

Nearly Every CIO Identifies at Least One Cyber Threat as a Risk to their Business

When 97% of CIOs all see things the same way, it’s probably a sign to take the risk of cyber threats seriously – a problem new data shows is only going to get worse in the next five years. I cover a ton of reports from cybersecurity vendors on our blog, but when you see a network infrastructure vendor put out a report with intent on just covering the challenges organizations are facing and they have some interesting data on cybersecurity, it got my attention.

A Guide to Third-Party Risk Management in the Financial Sector

In today's financial landscape, businesses are interconnected, and outsourcing and partnerships are necessary—meaning managing risks associated with third-party vendors is pivotal. Whether you're a small community bank or a multinational financial conglomerate, mastering third-party risk management is vital to safeguarding your institution against the vulnerabilities that third parties can introduce.

The Evolution of Artificial Intelligence in Cyber Threat Hunting

The role of artificial intelligence (AI) has become increasingly prominent, particularly in the realm of cyber threat hunting. Cyber threats continue to evolve in complexity and sophistication, posing significant challenges to traditional cybersecurity measures. As a result, organizations are turning to AI-driven solutions to enhance their threat detection and response capabilities.

Safeguarding Justice

In an era dominated by digital advancements, the legal landscape is not exempt from the pervasive threat of cyberattacks. Law firms, entrusted with sensitive and confidential client information, must prioritize cybersecurity to safeguard both their clients and their own reputation. The consequences of a security breach can be severe, ranging from financial losses to irreparable damage to the firm’s integrity.