Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Hidden Risk in Your Cloud: And What to Do About It

It's easy to assume everything in the cloud is sorted. Files get saved, apps sync across devices, permissions exist. And on paper, that sounds tidy enough. But in practice? Data goes wandering. A spreadsheet ends up in the wrong folder. A document shared with the wrong person stays shared. A test environment is spun up, used once, then forgotten. Nobody deletes it, of course. Nobody remembers it, either.

The Critical Importance of Supply Chain Risk Management in Cybersecurity

In the contemporary digital era, supply chains have transcended their traditional role as mere logistical networks. They have evolved into pivotal ecosystems that underpin the success of modern businesses. Nevertheless, as these intricate systems undergo digital transformation, they have become increasingly vulnerable to cyberattacks.

How LivePerson automates vulnerability management to reduce risk

For modern security teams, managing vulnerabilities efficiently is critical to reducing risk and maintaining a strong security posture. However, the sheer volume of vulnerabilities, complex IT environments, and resource constraints make traditional approaches unsustainable. Automating key aspects of vulnerability management not only speeds up remediation, but also ensures consistency and accuracy across the entire vulnerability lifecycle.

Automating your risk register using Tines Records

A risk register is a GRC tool used by teams to identify, assess, and manage various risks within an organization. It acts as a centralized repository and looks at the impact and probability of a risk to prioritize its management. In cyber security, a risk register helps maintain compliance with various standards like the ISO 27001 Information Security Management System (ISMS), NIST SP800-30 Guide for Conducting Risk Assessments, or the new European NIS 2 directive.

Milestone Progress: Accelerated Rating Rescans

Bitsight customers and their third-party partners are well on their way to gaining faster clarity on how their remediation efforts impact their Bitsight Security Ratings. In an effort to support organizations that use Bitsight to prioritize internal security work, we started a phased rollout of Dynamic Remediation, a new initiative that accelerates the rating refresh process and makes it more responsive to meaningful security remediations.

The Offensive Potential of Computer-Using Agents

Autonomous AI agents - known as Computer-Using Agents (CUAs) - are no longer science fiction! These systems can browse websites, interact with applications, and carry out tasks on their own. While intended to increase productivity, they can already be repurposed by threat actors for malicious use.

How AI is Changing The Way We Manage Cyber Exposure

Artificial intelligence isn’t just a buzzword in cybersecurity—it’s rapidly becoming the backbone of both offense and defense in the digital battlefield. From hyper-realistic deepfakes to machine learning-powered threat detection, AI is fundamentally changing how we manage cyber exposure.

Email List Hygiene and Cybersecurity Risks

Email is a tool that people and companies need. Conversely, poor email etiquette may put you in danger online from data leaks and phishing scams. Following cybersecurity best standards and keeping a clean email list helps to guard sensitive data. This paper covers the value of cyber hygiene in email contact, its benefits, and how technology, such as an email locating tool, could enhance security.