Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Corporate Security Trends: How S&P 500 Companies Stay Secure

Staying on top of corporate security trends may seem like a hassle, but it actually has great benefits for your organization. Understanding security trends helps businesses benchmark their performance—including within their specific industry—and strengthen their security posture to align with the best performers.

Bringing Data Privacy and Cyber Insurance Together with Bitsight

The cyber insurance industry continues to face challenges related to traditional cyber security risks, and more recently, data privacy risks. In many cases, traditional cyber insurance policies may cover legal fees or costs related to a data privacy infringement. Organizations not only get hit with class action lawsuits following incidents like breach of PII/PHI, but are seeing demand letters from law firms who are looking to protect their clients from any possible disclosure of their sensitive data.

UpGuard's Revamped Trust Page: Close Deals Faster

When it comes to closing a sales deal, trust and security are often just as important as the product or service you’re selling — sometimes even more important. The reason is simple. Before bringing you on as a new vendor, customers need to be confident that you’re a safe and secure partner. The challenge is proving your security posture quickly, without dramatically slowing the deal.

2025 Trustwave Risk Radar Report: Healthcare Sector: Key Risks and Defensive Measures

The healthcare industry, with its vast repository of electronic health records, a growing network of connected devices, reliance on legacy systems, and expanding telehealth solutions, continues to be a prime target for cyber threats. To provide deeper insights into these evolving risks, Trustwave SpiderLabs has expanded its healthcare cybersecurity research with the newly released 2025 Trustwave Risk Radar Report: Healthcare Sector - A New Era of Cybersecurity Challenges.

GPSec Boston 2025 - CTEM: How to Start When You Haven't Started

What does it really take to start a Continuous Threat Exposure Management (CTEM) program—especially if your organization hasn’t formally begun? In this GPSec Boston 2025 session, Scott Kuffer, COO and Co-founder of Nucleus Security, joins Chris Peltz, Director of Security Strategy at GuidePoint Security, to demystify CTEM by stripping away the buzzwords and breaking down the practical steps for getting started.

POAM Process Automation: Breaking the Manual Grind

Plans of Action and Milestones (POAM) play a critical role in public sector cybersecurity. In this webinar with government IT solutions provider Carahsoft, we break down the challenges security teams face when implementing POAMs, sharing real-life examples of where things go wrong and why. As part of the presentation, we also cover the intensive math of POAM programs: people, systems, and time.

Automated Risk Assessment Tools

As a CISO or security lead in a SaaS organization, the unthinkable could happen to you at any time. On a Friday evening, as you’re wrapping up work, you get a notification alerting you of a potential vulnerability in a customer-facing application. You have no idea what data has been leaked or how long this has been left exposed.

ISO 31000 vs. COSO ERM frameworks - Navigating the risk landscape

In an era where uncertainty is the norm, strong risk management isn’t just good practice – it’s a competitive advantage. For technology leaders steering organizations through complex challenges, two frameworks consistently rise to the top: ISO 31000 and the COSO Enterprise Risk Management (ERM) framework. Knowing how they differ – and where each shines – is key to building resilience and making smarter, strategy-aligned decisions.