Resources
Cybersecurity white papers, data sheets, webinars, videos and more
Resource Library
February 24, 2021
10 Ransomware Examples from Recent High-Impact Attacks
Ransomware has emerged as one of the most persistent and devastating threats facing businesses across all industries. As digital transformation accelerates and companies become increasingly dependent on critical infrastructure and interconnected systems, cyber attackers have refined their methods to exploit vulnerabilities in everything from email attachments to enterprise… Read More
Cyber Threat Intelligence
Tech Center
August 26, 2020
Healthcare IT Security and Compliance in 2024 and Beyond: A Comprehensive Guide
The healthcare industry remains a prime target for cyberattacks, with the growing adoption of digital health technologies escalating the risk. Hospitals and clinics, custodians of vast amounts of sensitive patient data, are particularly vulnerable. As the industry navigates the digital landscape, ensuring cybersecurity compliance is paramount to protecting patient… Read More
Healthcare
Services
Tech Center
July 23, 2020
What is a Third-Party Vendor? Tips for Managing Vendor Risk
A third-party vendor is a company or entity with a direct written contract to provide products or services to your customers on your organization’s behalf. In today’s digital landscape, organizations are heavily reliant on third-party vendors who help carry out day-to-day operations more efficiently. These vendors… Read More
Attack Surface Management
Tech Center
July 13, 2020
8 Effective Vendor Due Diligence Best Practices
Across industries, vendors are becoming essential assets to many organization’s day-to-day operations. However, it’s important to note that when an organization decides to work with or acquire a vendor, they are agreeing to take on any potential threats or drawbacks posed by the company, as well as its digital operations. Read More
Tech Center
April 6, 2020
The CISO’s Guide to Reporting Cybersecurity to the Board
Organizations have multiple stakeholders, all of whom have varying levels of cybersecurity knowledge and interest. As a CISO, you need to be able to demonstrate the effectiveness of the cybersecurity solutions you employ with regard to each stakeholders’ area of expertise. Using key performance indicators (KPIs) provides visibility into your… Read More
Tech Center
March 12, 2020
What is Cyber Threat Intelligence? A Complete Guide
With cyber threats becoming increasingly difficult to track and manage, IT professionals must take a proactive approach to security in order to protect their assets from a breach. This requires ongoing visibility into the threat landscape and the methods cyber adversaries are employing to carry out attacks. One way this… Read More
Cyber Threat Intelligence
Tech Center
January 6, 2020
4 Ways to Optimize Your Third Party Cyber Risk Management (TPCRM) Program
Managing your Third Party Cyber Risk Management (TPCRM) can be a tedious, time-consuming task, yet it is a critical one. Third parties pose a significant source of risk for most businesses. According to Ponemon’s 2018 Data Risk in the Third-Party Ecosystem report, 59% of respondents had reported a third-party-related data… Read More
Supply Chain Cyber Risk
Tech Center
June 18, 2019
Vendor Risk Assessment Template
When you work with third parties, their risk is your risk. Common risks associated with vendors include everything from compliance risk to operational risk to financial and reputational loss. Vendor risk assessments can help your organization narrow down… Read More
Tech Center