Blog
Page 85 of 152
What Does a Business Continuity Plan Typically Include?
Business continuity plans are vitally important for modern risk management because, unfortunately, there are so many ways for businesses to be disrupted. Your ability to recover quickly from that disruption and resume normal operations is crucial to your long-term survival. That said, plenty of organizations struggle to craft a business continuity plan. Why not? Because […]
November 9, 2021
What You Should Know About Web Shell Attacks
In a blog post published in February 2021, Microsoft noted that web shell attacks had been steadily increasing since mid-2020. There were 140,000 monthly web shell attacks from August 2020 to January 2021, more than twice the average from 2020. The increasing prevalence of these attacks has a simple reason: web shell attacks are easy […]
November 5, 2021
Common Causes of Data Backup Failures
No matter how careful you are with your data storage and data protection measures, the risk of data loss is always there. You need to be sure that your company is prepared in the event of cyber attacks or system failures. Hence the need for data backup is so important; a company must have a […]
Five Keys to Successful NIST Audits
AN INSIDE GRC PANEL DISCUSSION When it comes to NIST, are you truly prepared? If not, you’ll likely spend excess time and money only to get subpar results. The effort you put in on the front-end planning, preparing and getting organized can help meet your audit goals. But what does being prepared for an audit […]
Signs You’ve Been Targeted for DDoS BotNet Recruitment
Cybercrime can take many forms, and the criminals behind such attacks work with increasing sophistication — even to the point that some companies may, unwittingly, be helping criminals launch attacks against other organizations. For example, botnets are an organized network of infected devices at a hacker’s disposal, which the hacker then uses to carry out […]
Reciprocity Delivers Immediate Insight into Compliance and Risk with Risk Intellect
New, innovative risk-assessment product enables compliance-driven cyber risk management SAN FRANCISCO, Calif. – Nov. 3, 2021 – Reciprocity, a leader in information security risk and compliance, today announced Reciprocity® Risk Intellect, which provides organizations with a unique view of how their compliance programs are impacting their risk posture. This innovative new risk-assessment product delivers immediate, […]
Reciprocity Announces Launch of Risk Intellect
Compliance-driven Cyber Risk Management Reciprocity® Risk Intellect is a new risk-analysis tool that, when used with the Reciprocity ZenGRC® platform, provides insight on the impact your compliance programs have on your cyber risk posture. By mapping your current compliance control assessments to cyber risks, it provides immediate context and visibility into which cyber risks and […]
What is an SBOM and How is it Different from a CBOM?
In May 2021, President Joe Biden signed an executive order (EO) aiming to strengthen America’s cybersecurity. One key point in the EO was the need to improve software supply chain security, and reduce the vulnerabilities that allow adversaries to launch cyberattacks against public and private organizations. In June 2021, the National Telecommunications and Information Administration […]
October 29, 2021
What is a DDoS Attack & How to Protect Your Site
Cybersecurity threats evolve constantly, and it’s difficult for any organization to stay ahead of emerging risks. A company’s best defense against security breaches is to understand the tactics that hackers use, and then plan accordingly. In this post we’ll examine one of the common kinds of cyber attacks — a DDoS attack — and discuss […]
Page 85 of 152