New Google vulnerability: Learn about zero-day CVE-2022-3075 in Chorme web browser  | Fix now >> 

The CyberRisk Summit on-demand: Watch the latest #CRS anytime, anywhere | Watch now  >>

New report: Mapping MITRE ATT&CK framework to CVEs |  Read more  >>

The real cost of a data breach (according to IBM)

What’s the real cost of a data breach? Cyber security is a game of cat and mouse. Security practitioners and threat actors work to outrun each other, with the ultimate goal of securing – or accessing – critical data. And because so much work goes into protecting assets, practitioners are often stuck in the trenches,… Continue reading The real cost of a data breach (according to IBM)

SANS Cloud Security Survey 2022 – highlights

In 2022, security issues have increased in cloud assets, leading to more data breaches involving cloud environments. But, despite the growing threats and attached cyber risk, organizations are undeterred in migrating to the cloud with greater acceleration than ever before.  But is the greater exposure to cyber risk matched by organizations taking the steps to… Continue reading SANS Cloud Security Survey 2022 – highlights

CIS Benchmarks and system hardening: the ultimate guide

System hardening includes a set of best practices, tools, and approaches designed to reduce the vulnerability of technology applications, systems, and infrastructure. System hardening with resources such as CIS Benchmarks minimizes security risk by removing possible attack vectors and shrinking a system’s attack surface. This blog will explore the fundamentals of CIS benchmarks – what… Continue reading CIS Benchmarks and system hardening: the ultimate guide