Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

ISO 27001 Risk Register Setup: Step-by-Step Guide

While we talk a lot on this site about the US Government’s various cybersecurity frameworks, like FedRAMP and CMMC, there’s one significant framework that deserves just as much attention: ISO 27001. ISO 27001, being an ISO standard, is an international framework for cybersecurity divorced from any one country’s government.

Bitsight AI Empowers Microsoft's New Threat Intelligence Briefing Agent

Threat Intelligence (TI) has become the secret weapon of modern security teams—essential for identifying possible emerging threats before they escalate. But TI is only as valuable as its accuracy, relevancy, and timeliness. Unfortunately, many traditional TI approaches can no longer keep up, as security teams are plagued with information overload: too many signals, too little context, and limited resources to process everything. This is why the coupling of GenAI and TI is a game changer.

AI is already embedded in our everyday tools, often without us realizing it. | UpGuard #ai

“AI is already embedded in our everyday tools, often without us realizing it. That changes how security teams need to adapt.” Hear from Randy Vickers, Deputy CISO at the National Student Clearinghouse, in this fireside chat from UpGuard Summit 20, as he shares how his team is staying ahead of AI’s evolving role in cybersecurity.

The Real AI Agent Risk Isn't Data Loss. It's Unauthorized Action.

Your AI Agent just updated a vendor’s payment details in your Enterprise Resource Planning (ERP) system based on a seemingly harmless prompt. No data was exfiltrated. No access policy was violated. But now, a $250,000 payment is sitting in a fraudulent bank account. This is the new face of AI risk. As enterprises adopt AI Agents - either off the shelf or custom built, security teams are facing a fast-moving shift.

The Future of Vulnerability Management is Aggregated, Automated, and Agnostic

For years, vulnerability scanners have been the cornerstone of enterprise security programs. But as organizations scaled, and as infrastructure, applications, and attack surfaces diversified, the single-scanner model broke down. Security teams now face a fragmented reality. Data pours in from dozens of sources: endpoint detection tools, cloud security platforms, application security testing, and more. Each of these systems generates findings with its own schema, priorities, and assumptions. The result?

A Real-World Insider Risk Management Success Story with Teramind

Watch how a global travel company transformed their insider threat management with Teramind. In this RSA Conference 2025 case study, Teramind's VP of Product, David Pinckard, and arrivia's Executive Director of Revenue Integrity & Fraud, Justin Skagen, reveal how to: Move from reactive to proactive threat detection Streamline fraud investigations Manage human-driven security risks at scale Discover how leading organizations address the most unpredictable challenge in cybersecurity: insider threats.

Elevating Cyber GRC With a Smarter Risk Register Strategy

‍Cybersecurity governance, risk, and compliance (GRC) programs are gaining institutional support, with 61% of respondents from Sprinto's "Pulse of Cyber GRC Report 2025" claiming that embedding GRC into their business strategy is one of their organization's top priorities. Even so, only 53% state that they are doing so effectively, highlighting the prevalent gap that exists in the cybersecurity world between intention and execution.

Modeling Cyber Resilience Is Now a Regulatory Priority

‍ ‍The European Central Bank (ECB), tasked with maintaining financial stability in the region, is changing how it supervises institutional resilience. According to a July 2025 Reuters report, banks across the Eurozone are being asked explicitly to model how large-scale disruptions, including geopolitical conflict, potential dollar shortages, and cyber incidents, could impact their capital reserves.

Open Chroma Databases: A New Attack Surface for AI Apps

Chroma is an open-source vector store–a database designed to allow LLM chatbots to search for relevant information when answering a user’s question–and one of many technologies that have seen adoption grow with the recent AI boom. Like many databases, Chroma can be configured by end users to lack authentication and authorization mechanisms.