New & Notable
Risk assessments, metrics and frameworks News
August 11, 2020
Indiana University Health CISO Mitchell Parker discussed internal risk assessments, security snake oil salesmen and more at his Black Hat USA 2020 talk.
August 10, 2020
Elevate Security co-founder Masha Sedova spoke at Black Hat USA 2020 about why traditional security awareness training is ineffective and fails to change risky behavior.
January 20, 2020
In this Q&A with CyCognito CEO Rob Gurzeev, he discusses what led to his company, how attack simulations work and how he plans to spend the company's recent round of funding.
October 22, 2019
The new platform provides an extra layer of testing by sending its findings to Bugcrowd's crowdsourced security testing tools.
Risk assessments, metrics and frameworks Get Started
Bring yourself up to speed with our introductory content
Integrated risk management (IRM) is an approach to risk management that uses a set of practices and processes to improve an organization's security, risk tolerance profile and strategic decision-making. Continue Reading
Cybersecurity is the protection of internet-connected systems -- including hardware, software and data -- from cyberattacks. Continue Reading
Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives or projects. Continue Reading
Evaluate Risk assessments, metrics and frameworks Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Learn how the ZTX model can help IT leaders identify, organize and implement the appropriate cybersecurity tools to satisfy seven pillars of a zero-trust framework. Continue Reading
The zero-trust model demands infosec leaders take a holistic approach to security. Learn about the benefits of zero trust and how it differs from traditional security approaches. Continue Reading
Compare host IDS vs. network IDS through the pros and cons of each, and learn how more modern systems may be better suited to ensure effective enterprise security. Continue Reading
Manage Risk assessments, metrics and frameworks
Learn to apply best practices and optimize your operations.
An effective 'human firewall' can prevent or mitigate many of the threats enterprises face today. Adopt these seven elements of a culture of cybersecurity to defend against risks. Continue Reading
It pays to expect the unexpected in information security. In this webinar, learn how starting with a blank slate helps identify and mitigate common cybersecurity problems. Continue Reading
Never trust, always verify. Learn how to implement a zero-trust security model to help manage risk and protect IT workloads at your organization. Continue Reading
Problem Solve Risk assessments, metrics and frameworks Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Being a paramedic and working in cybersecurity taught CISO Rich Mogull how to avoid stress and burnout. Check out his advice to maintain mental health in high-stress roles. Continue Reading
This template from IANS Research can help IT and security professionals document and prioritize essential processes, staffing and systems when faced with a pandemic event. Continue Reading
The material collected here provides not just an explanation of why you need to adopt the zero-trust model, it serves as detailed guide on moving from adoption to implementation. Continue Reading