New & Notable
Risk assessments, metrics and frameworks News
March 02, 2021
Google has joined forces with two cyber insurance companies to craft specialized cyber insurance policies for Google Cloud customers called Cloud Protection+.
October 27, 2020
Adoption of the Mitre ATT&CK framework, which saw version 8.0 released Tuesday, has grown rapidly over the last years, though challenges still remain for enterprise users.
August 11, 2020
Indiana University Health CISO Mitchell Parker discussed internal risk assessments, security snake oil salesmen and more at his Black Hat USA 2020 talk.
August 10, 2020
Elevate Security co-founder Masha Sedova spoke at Black Hat USA 2020 about why traditional security awareness training is ineffective and fails to change risky behavior.
Risk assessments, metrics and frameworks Get Started
Bring yourself up to speed with our introductory content
Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats. Continue Reading
Cloud penetration testing presents new challenges for information security teams. Here's how a playbook from the Cloud Security Alliance can help inform cloud pen test strategies. Continue Reading
Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers that are able to prevent attacks launched by quantum computers. Continue Reading
Evaluate Risk assessments, metrics and frameworks Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
This five-step framework for performing a cybersecurity risk assessment will help your organization prevent and reduce costly security incidents and avoid compliance issues. Continue Reading
Organizations must ensure their pandemic business continuity and technology DR plans address cybersecurity, as well as remote employees, social distancing and company shutdowns. Continue Reading
Learn how to use the Mitre ATT&CK security framework to keep your enterprise cloud environment -- whether AWS, GCP, Azure, Azure AD or Microsoft 365 -- secure. Continue Reading
Manage Risk assessments, metrics and frameworks
Learn to apply best practices and optimize your operations.
Following the devastating SolarWinds breach, IT leaders should renew their focus on third-party risk management. Start by implementing supply chain security best practices. Continue Reading
From third-party risk assessments to multifactor authentication, follow these steps to ensure suppliers don't end up being your enterprise cybersecurity strategy's weakest link. Continue Reading
Every company, large and small, must assume it is a target in the supply chain. Suppliers should follow these best practices to keep themselves and their customers protected. Continue Reading
Problem Solve Risk assessments, metrics and frameworks Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Being a paramedic and working in cybersecurity taught CISO Rich Mogull how to avoid stress and burnout. Check out his advice to maintain mental health in high-stress roles. Continue Reading
This template from IANS Research can help IT and security professionals document and prioritize essential processes, staffing and systems when faced with a pandemic event. Continue Reading
Compare host IDS vs. network IDS through the pros and cons of each, and learn how more modern systems may be better suited to ensure effective enterprise security. Continue Reading