Free Cybersecurity Research, Whitepapers, Reports | SC Media
Cybersecurity Metrics: the Dummies Guide
Master cybersecurity metrics to spot gaps, act fast, and ensure your business stays secure and thrives.
More InfoCybersecurity Metrics that Matter IRL
Cybersecurity planning is key but often reactive. Watch our webinar to focus on metrics now for 2025 success.
More Info6 Best Practices for Developer Security in the Technology Industry
Tech companies are under constant pressure to release products quickly while maintaining robust security across their development cycles. Achieving this balance can be difficult, especially as development teams embrace new tools and technologies. Discover six best practices for embedding security into your developer workflows. These strategies hel...
More Info6 Best Practices in FinServ cheatsheet
Financial institutions face a constant pressure to innovate quickly and stay ahead of the competition while also maintaining robust security for their sensitive data. This delicate balance can be challenging to achieve, especially in the fast-paced FinServ industry.
Discover six best practices for implementing developer security within the develop...
More InfoOptimizing AppSec in FinServ Guide
Today’s banking companies face tough competition from the disruptors in financial tech. But as their developers work to release innovative customer experiences and keep pace with the competition, their application security teams must meet the demands of these accelerated development cycles.
In this guide, we offer valuable insights for moving at t...
More InfoOptimizing AppSec in the Technology Sector
Speed and innovation are crucial for technology companies to stay competitive. As developers strive to deliver innovative products and meet market demands, security teams must adapt to accelerated development cycles. This guide explores the following key areas to help you navigate the complexities of modern development:
The challenges and requi...
More InfoOperationalize Continuous Threat Exposure
By 2026, organizations prioritizing their security investments based on a continuous exposure management programme will be three times less likely to suffer from a breach.
Continuous evolving clouds with continuously evolving threats need continuous threat exposure management (CTEM). Skyhawk Synthesis Security Platform can operationalize your CTEM...
More InfoFight Fire with Fire
Threat actors are leveraging AI to execute better and more believable attacks, faster and at a greater scale. This makes securing your cloud even more challenging. Finding these threats when they look friendly and familiar is very difficult.
Skyhawk Security uses advanced AI to detect malicious behaviors and find threat actors. It reduces the numb...
More InfoPurple Team Assessment
In today’s rapidly evolving threat landscape, waiting for an attack is no longer an option. Skyhawk Security’s Purple Team Assessment employs AI-powered technology to simulate real-world attacks on your cloud infrastructure, identifying vulnerabilities before they can be exploited. Your security team receives a comprehensive, actionable report to ...
More InfoEnhancing Security Through Workflow Orchestration and Automation
In today’s rapidly evolving threat landscape, vulnerability management is more critical than ever. Security teams face increasing complexity, high volumes of vulnerabilities, and resource constraints that slow response times and increase risk. This guide explores how workflow orchestration and automation streamline vulnerability management by impr...
More InfoThe Essential SOAR Buyer’s Guide: Choosing the Right Platform for Your Security Team
SOAR isn’t obsolete—it’s evolving. Security teams still need automation and orchestration to streamline workflows, accelerate response times, and manage growing threats. The key is selecting a next-gen SOAR platform that integrates seamlessly, enhances security operations, and adapts to new challenges.
This guide breaks down SOAR evaluation essent...
More InfoThreat Management
Rx for cyber threats: Ten ways to diagnose and defend against healthcare’s biggest risks
Healthcare systems are under siege from an escalating wave of cyber threats that put patient data, critical services, and even lives at risk.
Infographic: 10 ways to mitigate security risks in healthcare
This report reveals the top 10 cybersecurity threats impacting healthcare today, drawing on insights from 200 frontline healthcare secur...
More InfoIncident Response
Cyber-nado: Preparing for the storm — A guide to incident response tabletop exercises
Cyber threats strike like an unpredictable storm—fast, relentless, and destructive.
Cyber-nado: Preparing for the storm is a practical guide designed to help organizations prepare for the chaos of a cyber incident through Incident Response Tabletop Exercises (TTX).
This eBook walks security leaders, IT teams, and executives through the ess...
More InfoIncident Response
Cyber incident response: Who’s at the table?
Cyber incidents are not just an IT problem. They require a coordinated response from multiple departments to minimize damage and recover efficiently. A well-structured tabletop exercise (TTX) ensures that all key stakeholders are prepared to act when a cyber crisis strikes.
Related eBook: Cyber-nado: Preparing for the storm — A guide to incid...
More InfoNavigating the AI Hype in Cybersecurity
Cybersecurity is awash with AI hype, with promises of better protection, lower costs, and reduced specialist headcount needs.
Our guide helps you navigate the hype and separate fact from fiction. It covers:
What AI can and can’t do to elevate cyber defenses
The reality of AI usage, expectations and concerns based on insights from 400 IT and cybe...
More InfoDeploying Managed Risk for Better Vulnerability Management: A How-to Guide
Managed Risk is designed to help organizations break through the vulnerability management walls they have grappled with in recent years. The first eBook in this series focused on the journey Sophos took with Tenable to achieve Managed Risk. This installment focuses on what comes next: deployment and optimization. This eBook will explore how to:
...
More InfoA 5-step blueprint for cyber resilience
In an era of relentless cyber threats, achieving cyber resilience is essential for businesses to safeguard their operations.
This storybook distills the key takeaways from LevelBlue’s 2024 Futures report into five critical steps to navigate these challenges and emerge stronger. By following these steps, organizations can better allocate resources...
More InfoCyber Resilience: The C-Suite Perspective
The 2024 LevelBlue Futures report unpacked the different concerns and objectives of C-Suite executives (CIOs, CTOs and CISOs), how those differences can come into conflict and how to find common ground on the path to cyber resilience to more effectively balance innovation, compliance and risk management.
This storybook distills the key insights i...
More InfoLeading the SOC: A Tactical Guide for SOC Managers
Juggling all of your responsibilities as a SOC manager is hard work. From coaching and managing your team to collaborating with higher-up executives and business stakeholders, you have a lot of important priorities to balance. To help, we tapped into the expertise of seasoned SOC leaders across the cybersecurity industry to uncover their strategi...
More InfoAI/ML
AI Governance: Key Components
As organizations rapidly adopt Generative AI, ensuring responsible, secure, and compliant AI deployment has become a top priority. This Generative AI Governance Framework infographic provides a clear, structured approach to mitigating AI risks while fostering trust and accountability.
By downloading this infographic, you will:
• Understand C...
More InfoGenerative AI
AI Governance: The CISO’s Quick Guide to Managing AI Risks and Compliance
As organizations integrate Generative AI (GenAI) into their operations, Chief Information Security Officers (CISOs) face mounting challenges in ensuring AI systems are secure, compliant, and ethically deployed.
This data sheet provides a concise, cloud-focused guide to help CISOs navigate these complexities.
This one-pager delivers an at-a-...
More InfoSecurity Program Controls/Technologies
CISO Top 10 – Technology Priorities
The rapidly evolving technological landscape continues to challenge and redefine how organizations prioritize their cybersecurity strategies.
As we closed out Q4 2024, the shifting priorities of CISOs and cybersecurity professionals underscored the need for adaptive and forward-thinking approaches to managing risk.
For more on the Top 10 ...
More InfoLeadership
CISO Top 10 – Executive Management Priorities
The rapidly evolving digital ecosystem continues to reshape how organizations approach security, demanding agile and forward-thinking strategies from cybersecurity leaders. The fourth quarter of 2024 revealed both pressing challenges and transformative opportunities, underscoring the essential role of cybersecurity leadership in ensuring organizat...
More InfoData Security
Top 5 Data Privacy Blind Spots
This insightful infographic from CyberRisk Collaborative draws attention to five critical but often-overlooked areas of data privacy risk. Designed for security leaders and teams, it highlights key challenges organizations face in managing sensitive information.
Highlights:
• Unstructured Data: Acknowledges the risks posed by unmanaged, scat...
More InfoData Security
Data Privacy in a Dynamic World – Essential Strategies for a Resilient Future
This one-pager serves as a quick-reference guide with practical strategies to strengthen data privacy in an ever-changing regulatory and threat landscape. It highlights the importance of aligning technical controls with compliance requirements while fostering a culture of privacy resilience.
Key Highlights:
• Core Principles: Includes guidan...
More InfoThe State of Cyber Resilience: Why IT and security leaders are bolstering cyber resilience as complexity increases
The IT and security industry is rapidly evolving due to digital transformation, changing work environments, and increasing cyber threats, creating more complexity for teams. To adapt, IT and security leaders are focusing on strengthening cyber resilience to protect against external threats and address internal challenges such as staffing and reso...
More InfoMeasuring Success: How to Build Cybersecurity Program Metrics from the Ground Up
In today’s evolving cybersecurity landscape, effectively communicating metrics to both technical and non-technical audiences is crucial. As cyber threats become more sophisticated, cybersecurity has shifted from a “don’t let it interfere” mindset to a strategic priority, with CISOs under pressure to prove program effectiveness and optimize costs....
More InfoRansomware and Cyber Threat Insights: The Rise of Ransomware’s Middle Class
We just released our latest Ransomware and Cyber Threat Insights Report: The Rise of Ransomware’s Middle Class, packed with critical insights and actionable strategies for navigating today’s unpredictable cyber landscape. Ransomware remains a formidable threat facing organizations, with 49 active groups impacting more than 1,000 publicly posted v...
More InfoDeploying Managed Risk for Better Vulnerability Management: A How-to Guide
Managed Risk is designed to help organizations break through the vulnerability management walls they have grappled with in recent years. The first eBook in this series focused on the journey Sophos took with Tenable to achieve Managed Risk. This installment focuses on what comes next: deployment and optimization. This eBook will explore how to:
...
More InfoReimagine Workforce Security for End-to-End Identity Protection
The threat landscape is rapidly shifting with the emergence of new identities, environments and attack methods. Cybercriminals are finding new ways to penetrate networks, disrupt business-critical systems and steal confidential data.
Traditional identity and access management (IAM) systems like multi-factor authentication (MFA) and single sign-on...
More InfoEmail security
eMail Security: AI-based tools expected to become a game changer in 2025
Organizations are increasingly looking towards AI platforms as a solution to the advancing tide of fraudulent emails and phishing attempts.
The hope is that AI and automation platforms will allow network defenders to free themselves up to better handle more pressing threats and easily isolate suspicious messages. At the same time, organization...
More InfoCloud Security
Cloud Computing Roles and Responsibilities
This infographic highlights the distinct roles and responsibilities crucial to managing cloud computing effectively. The CIO leads the cloud strategy, ensuring alignment with business goals, while the CISO focuses on embedding security into adoption processes, assessing compliance, and managing incident response. IT Operations handles the technica...
More InfoCloud Security
Securing the Cloud in a Dynamic World: Essential Strategies for a Resilient Future
Cloud security remains a top priority for organizations transitioning to cloud technologies, as they face the dual challenge of innovation and protecting sensitive assets. For Chief Information Security Officers (CISOs), managing cloud environments within the shared responsibility model requires careful attention to safeguarding both provider infr...
More InfoHow to Run a Cybersecurity Tabletop Exercise
Insights from frontline professionals
Small and medium-sized businesses (SMBs) bear the brunt of the cybersecurity skills gap.
Based on the insights of 5,000 frontline IT/cybersecurity professionals, this report reveals the frontline impact of the resourcing shortage. It includes:
How and why SMBs are disproportionately impacted by the cybersecu...
More InfoCECA evaluations confirm runZero’s active scanning enhances ICS visibility without performance impact on SCADA
The National Renewable Energy Laboratory (NREL)’s Clean Energy Cybersecurity Accelerator™ (CECA) program performed an evaluation of the runZero Platform that accurately identified and inventoried all OT and IT IP-addressable assets through proprietary active scanning and passive traffic sampling in the test environment.
The CECA evaluations confi...
More InfoThe State of Asset Security: Uncovering Alarming Gaps & Unexpected Exposures
As a leading CAASM platform, runZero has a unique perspective on the state of asset security. Our research team recently analyzed tens of millions of sample data points to better understand today’s attack surfaces, exposure patterns, and emerging threats — and the results were surprising!
Download the inaugural runZero Research Report to see what...
More InfoAddressing the cybersecurity skills shortage in SMBs
Insights from frontline professionals
Small and medium-sized businesses (SMBs) bear the brunt of the cybersecurity skills gap.
Based on the insights of 5,000 frontline IT/cybersecurity professionals, this report reveals the frontline impact of the resourcing shortage. It includes:
How and why SMBs are disproportionately impacted by the cybersecu...
More InfoCyber Insurance and Cyber Defenses 2024
Lessons from IT and Cybersecurity Leaders
Better understand the complex relationship between cyber defenses and cyber insurance in this report based on a global survey of 5,000 IT/cybersecurity leaders. It includes:
Factors driving organizations to take out cyber coverage
The impact of cyber defense investments on insurability
Incident payouts, ...
More InfoCritical Barriers to Cyber Resilience (and How to Overcome Them)
The 2024 LevelBlue Futures report captures the growing risks businesses face and the variety of challenges that get in the way of cyber resilience. For example:
Compliance with regulations often demands unattainable information.
Cyber resilience is frequently not prioritized across the entire organization.
Lack of clarity over responsibilities p...
More InfoCyber Resilience: The C-Suite Perspective
The 2024 LevelBlue Futures report unpacks the different concerns and objectives of C-Suite executives (CIOs, CTOs and CISOs), how those differences can come into conflict and how to find common ground on the path to cyber resilience to more effectively balance innovation, compliance and risk management.
This storybook distills the key insights in...
More InfoIntroducing Full Content Inspection: The most powerful anti-hacking protection ever invented
More InfoAI in cybersecurity: Secret weapon or hidden threat?
Organizations recognize the potential in adopting AI both for general use and for their security platforms in general. Many see AI tools as a possible way to streamline everyday tasks, freeing up administrators and security professionals to focus on broader, long-term strategic matters. There are, however, concerns around just how difficult it wi...
More InfoIdentity
Infographic: Benefits of Just-in-Time (JIT) Access Provisioning
By adhering to clear access policies and lever- aging tools like Multi-Factor Authentication (MFA) and Just-In-Time (JIT) access, organizations can streamline security while minimizing risks. This infographic outlines what that looks like, using insights compiled by a CyberRisk Collaborative task force formed to address the complexities faced by C...
More InfoThe Power of IAM: Simplifying Access, Strengthening Security
In October 2024, members of the CyberRisk Collaborative organized a task force to address the complexities faced by CISOs in implementing and optimizing identity security.
This task force aimed to develop a shared understanding of the challenges around identity security, create a framework for a mature program, and provide practical steps and t...
More InfoPasswordless: Identity Threat’s Nightmare
If you are wondering where to start your passwordless journey, this eBook is for you. While focusing on best practices in securing both the workforce and high-risk users, it explores different options for passwordless authentication, the specific security and compliance tradeoffs they entail and the long-term benefits gained by going passwordless...
More InfoEBOOK – How to Build an MSSP Cyber Security Awareness Training Plan
Find out why MSSPs must integrate comprehensive security awareness training into their services to continue to ensure effective cybersecurity for their clients
More InfoHow Check Point and FutureSafe Reduce Regulatory and Financial Risk for MSP’s – and Raise the Bottom Line
Read the Case Study about FutureSafe, a Check Point MSSP, offering a carefully curated selection of top-tier cybersecurity services.
More InfoEBOOK – Shifting the Cyber Security Sales Paradigm
Why MSSPs Should Transition from Fear-Based Sales Strategies to a Value Centric Approach
More Info10 Must-Know Benefits of Cyber Security Managed Services (MSSPs)
Discover the top 10 advantages of leveraging cybersecurity managed services, from enhanced threat detection and proactive risk management to cost-effective solutions that ensure round-the-clock protection of critical business assets.
More InfoCheck Point’s MSSP Partner Program
Enabling MSSPs to Boost Growth and Enrich their Services. Learn about our Top Tier Security through a simple, scalable and profitable program.
More InfoThe Hidden Costs of Legacy SOAR
With Security Orchestration, Automation, and Response (SOAR) solutions, what you see isn’t always what you get. D3’s new whitepaper exposes the hidden costs and frustrations of legacy SOAR tools that often lead to abandoned implementations and wasted resources. Drawing from real-world experiences and breaking down common pitfalls, this report is ...
More InfoD3 MSSP Survey 2024
D3’s 2024 MSSP Survey provides a comprehensive snapshot of the managed security service provider industry, straight from the professionals on the front lines. This groundbreaking report reveals the current state of MSSPs, their challenges, growth strategies, and the transformative impact of automation on their operations.Download the survey to di...
More Info2024 SANS SOC Survey Report
The 2024 SANS SOC Survey delivers comprehensive insights into the operations of modern Security Operations Centers (SOCs), based on feedback from over 1,500+ security experts. This report explores the current landscape, identifying obstacles and strategies for optimizing security operations. Read this report to learn about:
Enhancing SOC capabil...
More Info2024 Osterman Research Making the SOC More Efficient Report
Gain insights into the challenges facing SOCs and discover the most effective strategies for increasing efficiency and reducing analyst burnout.
Security Operations Centers (SOCs) are struggling to keep pace with escalating alert volumes, sophisticated threats, and analyst burnout. This 2024 report from Osterman Research, sponsored by Dropzone AI...
More InfoCISO’s Guide to Leveraging AI in Security Operations
Discover how AI can enhance your SOC by reducing alert overload, improving response times, and focusing your team on real threats.
SOCs are overwhelmed by an ever-growing number of alerts, complex cyberattacks, and a shortage of skilled analysts. The CISO Guide to Leveraging AI in Security Operations provides clear insights into how AI can tackle...
More InfoThe Strategic Buyer’s Guide to AI Solutions for SOCs
Learn how AI can transform your SOC by automating alert investigations, improving response times, and allowing your team to focus on the most critical threats.
SOCs are inundated with an overwhelming number of alerts, and keeping up can be difficult. The Strategic Buyer’s Guide to AI Solutions for SOCs provides actionable insights on how AI can s...
More InfoThe ultimate buyers’ guide for privileged access management (PAM) in 2024
ManageEngine’s PAM Buyer’s Guide provides essential insights to help you choose the right PAM solution based on factors like critical capabilities, implementation timeline, compliance, cyber insurance, and ROI. Whether you are just getting started with privileged access management or switching from another solution, this guide will help you gain ...
More InfoAn all-encompassing, objective approach to PAM maturity
ManageEngine’s PAM maturity model will help you understand the level of PAM capabilities that you need and give you insights on how to move ahead in your PAM journey based on your identity security policies, enterprise environment, IT priorities, and more—regardless of which industry vertical you belong to.
Empowered by ManageEngine’s decades of ...
More InfoAM Policy Template
Cybersecurity technology goes hand in hand with policy-based governance. One of the first steps to Privileged Access Management (PAM) success is defining clear and consistent policies that everyone who uses and manages privileged accounts understands and accepts.
You can use this sample policy as a starting point to build a PAM policy for your or...
More InfoThe Future of Workplace Passwords: Not Dead, but Evolving
As consumer technology brands and the FIDO Alliance create demand for passwordless authentication, you’re bound to hear that your employees expect the same type of seamless login experience at work.
However, workplaces have complex technology and process requirements that are tied to traditional password-based authentication. Plus, even if you re...
More InfoZero Trust Privilege for Dummies
An estimated 80% of breaches involve privileged access abuse (according to Forrester Research). Such violations include highly visible supply chain breaches at Solar Winds, Microsoft Exchange, and Colonial Pipeline. Along with an Executive Order from the Biden administration in the U.S., this has brought zero trust into the spotlight.
While there...
More InfoConversational Cyber Insurance
2nd Edition: Updated and Expanded for 2024
Cyber insurance isn’t a legal term, nor even a standard insurance term. There are hundreds, if not thousands, of cyber insurance policies from insurance companies worldwide. Each one tries to provide a unique offering to gain an advantage over the competition, which can make identifying the right policy ...
More InfoPAM for Dummies
A fast, easy read to get up to speed on Privileged Access Management (PAM) and security basics
With so many recent high-profile breaches accomplished through the compromise of passwords on privileged accounts, it’s time all cybersecurity stakeholders got educated. This free, 24-page book, Privileged Access Management (PAM) for Dummies, gives you,...
More InfoWhy modern IAM Is crucial for identity security
In today’s dynamic hybrid-cloud work from anywhere environments, traditional IAM falls short as any user can become highly privileged while accessing sensitive data or taking high-value actions. Modern IAM is crucial, offering intelligent privilege controls for security-first access. Delve into modern IAM approaches within Identity Security strat...
More InfoIntegrating NIST CSF into Third-Party Risk Management: Strategies for Enhanced Security and Compliance
This guide will explore the NIST functions relevant to TPRM, the scale for determining how mature your NIST implementation is, supply chain requirements included in NIST CSF and the platform functionality that can help a team meet those requirements.
TPRM professionals evaluate vendors from a variety of industries and geographies, often from stri...
More InfoTracking and Mitigating Emerging Threats in Third-Party Risk Management
This white paper will explore the process of prioritizing third parties for incident response, building and distributing an incident-response questionnaire, and reporting on an organization’s risk status after a threat has been identified and evaluated.
Organizations are overwhelmed by the many indicators of compromise (IoCs) they are alerted to,...
More InfoAI/ML
AI in cybersecurity: Secret weapon or hidden threat?
This month’s Cybersecurity Buyer Intelligence Report is based on an online survey conducted in September 2024 among 192 security and IT leaders and executives, practitioners, administrators, and compliance professionals in North America from CRA’s Business Intelligence research panel. The objective of this study was to explore various topics relat...
More InfoYour Path to Zero CVE Images: A Practical Approach
As cyber threats grow more sophisticated, securing the software pipeline has become critical. This article explores the importance of using zero CVE (Common Vulnerabilities and Exposures) images in containerized environments to mitigate risks early in the development lifecycle. By selecting a well-supported operating system, leveraging curated ba...
More InfoSecurity Program Controls/Technologies
Checklist: Security Tool Stack Selection
Optimizing your cybersecurity tool stack can often be a daunting exercise fraught with vulnerabilities, misconfigurations and too much or too little control.
Innovation is key to staying ahead in cybersecurity, but sometimes chasing the ‘next big thing’ doesn’t lead you to the right destination. While it can seem essential to adopt the latest ...
More InfoSecurity Program Controls/Technologies
Ten Tips for Tool Stack Optimization
Optimizing your cybersecurity tool stack can often be a daunting exercise fraught with vulnerabilities, misconfigurations and too much or too little control.
Innovation is key to staying ahead in cybersecurity, but sometimes chasing the ‘next big thing’ doesn’t lead you to the right destination. While it can seem essential to adopt the latest ...
More InfoSecurity Program Controls/Technologies
Strategic Selection and Optimization of Security Tool Stacks: A one-page guide
In today’s complex cybersecurity landscape, CISOs are tasked with building and maintaining tool stacks that not only defend against evolving threats but also drive efficiency and resilience. However, the strategic selection and optimization of these tools is far from straightforward. Common challenges, such as vendor sprawl, sunk cost fallacy, and...
More InfoFocus on what matters most! Exposure management and your attack surface
There’s one certainty when it comes to your attack surface – it’s changing constantly. New vulnerabilities are disclosed hourly, new exploits for old vulnerabilities are publicly released and threat actors are updating their techniques continuously. Keeping up with the changing threat landscape while prioritizing your security resources most effe...
More InfoWhy Multi-Layered Defense is Critical in Application Security
Dark Reading’s latest report reveals why an end-to-end defense strategy is essential to protecting your organization against the relentless wave of cyber threats. See why our OPSWAT and F5 combined solution enables organizations to enhance their overall cybersecurity posture.
Get Data-Backed Intel on Key Topics Including:
Lack of Preparedness fo...
More InfoReal World Guide To Implement Least Privilege
Post-breach investigations often show that attackers exploit excessive privileges to move laterally within networks, accessing sensitive data. CISOs should counter this threat with a least privilege security model, granting users only the permissions they need for their job, and only for the time they need it. Despite being a long-standing best p...
More InfoSolving the SIEM Problem
Tired of traditional SIEM solutions creating more headaches for you? You’re not alone.
While SIEMs were built to gather and correlate data and streamline your IT operations, most have become too noisy and complex to manage. From false positives to the need for specialized management—not to mention skyrocketing costs as your data intake grows—lega...
More InfoApplication security
Application security: Buyers prioritize intuitive user interfaces and compliance support
Application security is more important than ever, yet at the same time organizations are asking their developers to address a growing number of threats with smaller teams over larger landscapes.
In many cases, respondents of our August 2024 Cybersecurity Buyer Intelligence survey said that smaller teams are tasked with securing the code of more...
More InfoIncident Response
Shared responsibility model for BC/DR and incident response in the cloud
In August 2024, members of the CyberRisk Collaborative organized a task force to address the complexities faced by CISOs in implementing and optimizing incident response programs.
This task force aimed to develop a shared understanding of the challenges around incident response, create a framework for a mature incident response program, and pr...
More InfoIncident Response
Improving incident response: 5 tips for cloud BC/DR Resilience
In August 2024, members of the CyberRisk Collaborative organized a task force to address the complexities faced by CISOs in implementing and optimizing their business continuity, disaster recovery and incident response programs.
This task force aimed to develop a shared understanding of the challenges around business continuity, disaster recov...
More InfoVulnerability Management
Mastering vulnerability prioritization: A comprehensive guide to effective risk management
In the rapidly evolving field of cybersecurity, assessing and prioritizing vulnerabilities is crucial for protecting systems and data. The Common Vulnerability Scoring System (CVSS) is widely used to provide a standardized way to rate the severity of vulnerabilities. Over the years, CVSS has evolved through several versions—CVSS2, CVSS3, and the a...
More InfoVulnerability Management
Framework for mitigating vulnerabilities
When it comes to achieving more effective vulnerability management, CISOs from the CyberRisk Collaborative recommend following this framework:
More InfoGovernance, Risk and Compliance
Top 5 indicators of an effective GRC program
In May 2024, members of the CyberRisk Collaborative organized a task force to address the complexities faced by CISOs in implementing and maturing GRC programs. This task force aimed to develop a shared understanding of GRC, create a framework for a mature GRC program, and provide practical steps and tools for organizations at various stages of th...
More InfoGovernance, Risk and Compliance
How to Build a Mature GRC Program from the Ground Up
In May 2024, members of the CyberRisk Collaborative organized a task force to address the complexities faced by CISOs in implementing and maturing GRC programs. This task force aimed to develop a shared understanding of GRC, create a framework for a mature GRC program, and provide practical steps and tools for organizations at various stages of th...
More InfoSecurity Management
What makes a security metric useful?
A security metric is only valuable when it meets certain conditions. Here are the key factors that make a security metric useful to a cybersecurity program:
More InfoSecurity Management
What is a security metric?
A security metric is defined by the following characteristics:
More InfoSecurity Management
Roadmap to effective security metrics: Guidance from the CyberRisk Collaborative
In September 2022, members of the CyberRisk Collaborative organized a task force to share information about their use of security metrics and develop guidance for new members on how to develop and use these metrics to improve their cybersecurity programs.
By March 2023, a standing security metrics task force was initiated to develop the CyberRi...
More InfoIdentity
The state of identity 2024: Resolving the tug of war between security and user experience
In 2024, identity is everything everywhere all at once.
Our digital identities, specifically, help us navigate the complexities of an increasingly connected world. From mobile banking apps, online shopping and social media to video streaming services, patient health portals or AirBnB reservations, digital identities are what make it possible fo...
More InfoIncident Response
Incident Response team burnout and resource constraints give attackers the advantage
In the fast-paced realm of cybersecurity, the gap between detecting a threat and effectively responding to it can be critical. This year, incident response teams are facing unprecedented challenges that go beyond the cyber threats themselves. Widespread burnout and resource shortages are compounding the difficulties of managing and mitigating secu...
More InfoSOC Modernization and the Role of XDR
It’s no secret security operations are growing to be more complex than they were two years ago. From the massive pressure to detect and respond to threats to the persistent need to improve visibility and scalability, security professionals need to optimize their SOCs to ultimately keep organizational risk minimized.Download this in-depth eBook to...
More InfoThe Worst Day: A Cybersecurity Graphic Novel
Bill, the CISO of a mid-size organization, is looking forward to a day at the ballpark, watching his daughter’s team, the Penguins, play for the city softball championships. Little did he know that his perfect day would be his worst day yet.In this ebook, learn how an Open XDR platform would have changed the outcome.
“If I didn’t know better, I w...
More InfoA Risk-Based Playbook for Quantum-Safe Migration
The long-awaited 2024 final Post Quantum Cryptography (PQC) selection process by NIST will formally activate the largest, global cryptographic transition in the history of computing affecting the data, systems, devices, and networks we rely on daily.
Don’t panic, plan wisely. Understanding the security architecture of your networks, and the vast ...
More InfoThe state of data security management
Legacy data-security practices are inadequate for rapid cloud expansion and skyrocketing volumes of information. Paul Wagenseil looks at new ways to keep data accessible and secure.
More InfoData security in 8 steps
There are several sequential steps that should be taken as part of an overall DSPM deployment, with the implementation of a DSPM tool as one of the final stages:
More InfoHow Tanium Helps Organizations Comply with the New SEC Cyber Disclosure Requirement
IT systems are more critical and more vulnerable than ever in today’s digital world. Yet, investors must be able to evaluate a company’s cyber risk management approach to make a reasonable investment decision.The SEC has recognized this, rolling out cybersecurity disclosure regulations that went into effect in December 2023 for all public compani...
More InfoProtecting the IT attack surface while advancing digital transformation
What does it take to achieve excellent attack surface management in the age of digital transformation?Protecting complex attack surfaces is difficult and often requires cyber tools that have complementary capabilities. Good cyber hygiene, effective configuration management that enforces cybersecurity policies, and continuous monitoring of cyber t...
More InfoTanium for Cyber Insurance
Managing and protecting the thousands of devices that are connected to your network has never been more challenging. Cyber insurance is a key tool to mitigate the associated risks.However, the underwriting process can be burdensome and result in missed opportunities for both the insured and the insurer.To alleviate this burden, Tanium has partner...
More Info