Tag: Risk Management
-
ICS CERT predictions for 2024: What you need to know
As we work through the first quarter of 2024, various sectors are continuously adapting to increasingly complex cybersecurity threats. …
-
How I got started: Ransomware negotiator
Specialized roles in cybersecurity are proliferating, which isn’t surprising given the evolving threat landscape and the devastating …
-
The UK energy sector faces an expanding OT threat landscape
Critical infrastructure is under attack in almost every country, but especially in the United Kingdom. The UK was the most attacked country …
-
Vulnerability Risk Management for External Assets
With each new cloud application or third-party SaaS account, the external attack surface of pretty much every organization keeps growing …
-
[Free & Downloadable] Cybersecurity Risk Management Template – 2024
This comprehensive cybersecurity risk management template provides a structured approach for identifying, assessing, and prioritizing …
-
Third-party breaches hit 90% of top global energy companies
A new report from SecurityScorecard reveals a startling trend among the world’s top energy companies, with 90% suffering from data …
-
Mapping attacks on generative AI to business impact
If generative AI is the next big platform to transform the services and functions on which society as a whole depends, ensuring that …
-
Ermac malware: The other side of the code
When the Cerberus code was leaked in late 2020, IBM Trusteer researchers projected that a new Cerberus mutation was just a matter of time. …
-
DORA and your quantum-safe cryptography migration
Quantum computing is a new paradigm with the potential to tackle problems that classical computers cannot solve today. Unfortunately, this …
-
Updated SBOM guidance: A new era for software transparency?
in 2023. Since President Biden’s 2021 executive order, software bills of materials (SBOMs) have become a cornerstone in protecting supply …
-
The CISO’s guide to accelerating quantum-safe readiness
While quantum computers are expected to help solve some of the world’s most complex problems, they also pose a risk to traditional …
-
IT and OT cybersecurity: A holistic approach
In the realm of cybersecurity, both information technology (IT) and operational technology (OT) present distinct challenges that …
●●●