Resources

Cybersecurity white papers, data sheets, webinars, videos and more

Resource Library

Clear filters

Understanding the Basics of Cyber Insurance: What You Need to Know

March 7, 2022

Understanding the Basics of Cyber Insurance: What You Need to Know
Data breaches and cybercrime are all too common. And in recent years, ransomware attacks have caused many organizations to face hefty extortion payments, legal fees, and reputational damage – not to mention the major headache that comes with each. Cyber insurance has become a powerful tool in the world of… Read More
Cyber Insurance
Executive Viewpoint
Tech Center
First-Party vs Third-Party Cyber Insurance: What’s the Difference?

December 6, 2021

First-Party vs Third-Party Cyber Insurance: What’s the Difference?
Often it’s not a question of if your business will experience a data breach, but when. Hackers are always looking for new ways to take advantage of weak networks or trick employees into falling prey to their schemes. And if your business operates computer systems or handles sensitive data regularly,… Read More
Cyber Insurance
Executive Viewpoint
Tech Center
Integrating Cybersecurity into Business Continuity Planning

May 12, 2021

Integrating Cybersecurity into Business Continuity Planning
Organizations can no longer afford to wait until a threat is identified to start worrying about their cybersecurity risk management program. A cyber attack can cause a major business disruption across departments and severely impact day-to-day operations, both in the short and long term. For this reason, as organizations build… Read More
Tech Center
The Ultimate Data Breach Response Plan

March 24, 2021

The Ultimate Data Breach Response Plan
In a hyper-connected world, security breaches continue to increase in size and scope. Cybersecurity threats come in various forms, from social engineering to database vulnerability exploitation. With that in mind, potential damages caused by these data breaches… Read More
Services
Tech Center
How to Resolve Findings on Your SecurityScorecard Rating

March 16, 2021

How to Resolve Findings on Your SecurityScorecard Rating
Benjamin Franklin once said, “in this world, nothing is certain except death and taxes.” However, if he were here today, he would likely add cybersecurity risk to that list. Regardless of cybersecurity program maturity or IT infrastructure complexity, every organization faces digital security threats. Managing risk is an… Read More
Security Ratings
34 Resources for Employee Cybersecurity Training

March 8, 2021

34 Resources for Employee Cybersecurity Training
Cybersecurity is a team effort. Most people have heard the adage, “there’s no ‘I’ in ‘team’,” but many companies struggle to create a workplace rallying cry when it comes to information security. Every organization has different needs, both from budget and compliance standpoints. Like every other aspect of cybersecurity, no… Read More
Tech Center
10 Ransomware Examples from Recent High-Impact Attacks

February 24, 2021

10 Ransomware Examples from Recent High-Impact Attacks
Ransomware has emerged as one of the most persistent and devastating threats facing businesses across all industries. As digital transformation accelerates and companies become increasingly dependent on critical infrastructure and interconnected systems, cyber attackers have refined their methods to exploit vulnerabilities in everything from email attachments to enterprise… Read More
Cyber Threat Intelligence
Tech Center
Healthcare IT Security and Compliance in 2024 and Beyond: A Comprehensive Guide

August 26, 2020

Healthcare IT Security and Compliance in 2024 and Beyond: A Comprehensive Guide
The healthcare industry remains a prime target for cyberattacks, with the growing adoption of digital health technologies escalating the risk. Hospitals and clinics, custodians of vast amounts of sensitive patient data, are particularly vulnerable. As the industry navigates the digital landscape, ensuring cybersecurity compliance is paramount to protecting patient… Read More
Healthcare
Services
Tech Center
What is a Third-Party Vendor? Tips for Managing Vendor Risk

July 23, 2020

What is a Third-Party Vendor? Tips for Managing Vendor Risk
A third-party vendor is a company or entity with a direct written contract to provide products or services to your customers on your organization’s behalf. In today’s digital landscape, organizations are heavily reliant on third-party vendors who help carry out day-to-day operations more efficiently. These vendors… Read More
Attack Surface Management
Tech Center
8 Effective Vendor Due Diligence Best Practices

July 13, 2020

8 Effective Vendor Due Diligence Best Practices
Across industries, vendors are becoming essential assets to many organization’s day-to-day operations. However, it’s important to note that when an organization decides to work with or acquire a vendor, they are agreeing to take on any potential threats or drawbacks posed by the company, as well as its digital operations. Read More
Tech Center
The CISO’s Guide to Reporting Cybersecurity to the Board

April 6, 2020

The CISO’s Guide to Reporting Cybersecurity to the Board
Organizations have multiple stakeholders, all of whom have varying levels of cybersecurity knowledge and interest. As a CISO, you need to be able to demonstrate the effectiveness of the cybersecurity solutions you employ with regard to each stakeholders’ area of expertise. Using key performance indicators (KPIs) provides visibility into your… Read More
Tech Center
What is Cyber Threat Intelligence? A Complete Guide

March 12, 2020

What is Cyber Threat Intelligence? A Complete Guide
With cyber threats becoming increasingly difficult to track and manage, IT professionals must take a proactive approach to security in order to protect their assets from a breach. This requires ongoing visibility into the threat landscape and the methods cyber adversaries are employing to carry out attacks. One way this… Read More
Cyber Threat Intelligence
Tech Center
4 Ways to Optimize Your Third Party Cyber Risk Management (TPCRM) Program

January 6, 2020

4 Ways to Optimize Your Third Party Cyber Risk Management (TPCRM) Program
Managing your Third Party Cyber Risk Management (TPCRM) can be a tedious, time-consuming task, yet it is a critical one. Third parties pose a significant source of risk for most businesses. According to Ponemon’s 2018 Data Risk in the Third-Party Ecosystem report, 59% of respondents had reported a third-party-related data… Read More
Supply Chain Cyber Risk
Tech Center
Vendor Risk Assessment Template

June 18, 2019

Vendor Risk Assessment Template
When you work with third parties, their risk is your risk. Common risks associated with vendors include everything from compliance risk to operational risk to financial and reputational loss. Vendor risk assessments can help your organization narrow down… Read More
Tech Center