Resources

Cybersecurity white papers, data sheets, webinars, videos and more

Resource Library

Clear filters

How to Resolve Findings on Your SecurityScorecard Rating

March 16, 2021

How to Resolve Findings on Your SecurityScorecard Rating
Benjamin Franklin once said, “in this world, nothing is certain except death and taxes.” However, if he were here today, he would likely add cybersecurity risk to that list. Regardless of cybersecurity program maturity or IT infrastructure complexity, every organization faces digital security threats. Managing risk is an… Read More
Security Ratings
34 Resources for Employee Cybersecurity Training

March 8, 2021

34 Resources for Employee Cybersecurity Training
Cybersecurity is a team effort. Most people have heard the adage, “there’s no ‘I’ in ‘team’,” but many companies struggle to create a workplace rallying cry when it comes to information security. Every organization has different needs, both from budget and compliance standpoints. Like every other aspect of cybersecurity, no… Read More
Tech Center
What Is a Cybersecurity Vulnerability and How Do They Lead to Breaches?

February 25, 2021

What Is a Cybersecurity Vulnerability and How Do They Lead to Breaches?
As the value of data increases, the role cybersecurity plays in maintaining enterprise operations has grown substantially. In order for organizations to successfully cultivate new business relationships, they must be able to protect both customer and employee data from a breach. Achieving this level of security requires a… Read More
Tech Center
10 Ransomware Examples from Recent High-Impact Attacks

February 24, 2021

10 Ransomware Examples from Recent High-Impact Attacks
Ransomware has emerged as one of the most persistent and devastating threats facing businesses across all industries. As digital transformation accelerates and companies become increasingly dependent on critical infrastructure and interconnected systems, cyber attackers have refined their methods to exploit vulnerabilities in everything from email attachments to enterprise… Read More
Cyber Threat Intelligence
Tech Center
5 Network Segmentation Best Practices to Maximize Cybersecurity

February 17, 2021

5 Network Segmentation Best Practices to Maximize Cybersecurity
Cybercriminals have many tactics for attacking your organization’s systems and networks, and while many attacks fail, some do succeed — there were more than 800 publicly reported breaches in the first three quarters of 2020 alone, according to the Identity Theft Resource Center, and there were likely… Read More
Tech Center
What Is an Attack Vector? 20 Common Ways Hackers Break In and How to Prevent Them

January 25, 2021

What Is an Attack Vector? 20 Common Ways Hackers Break In and How to Prevent Them
What Is an Attack Vector? An attack vector is the method or path an attacker uses to gain unauthorized access to a computer, network, system, or user account. These vectors are the entry points hackers exploit to deploy malware, steal data, manipulate systems, or interrupt business operations. Read More
Attack Surface Management
Tech Center
What Is Two-Factor Authentication (2FA Security) ?

November 16, 2020

What Is Two-Factor Authentication (2FA Security) ?
Passwords have been used to secure facilities and information since ancient times. The Greeks and Romans used password protection in their militaries to ensure that approaching troops could be trusted, and even today, the U.S. military uses call-and-response passwords to defend classified areas in hostile… Read More
Tech Center
How Can You Secure Risky Open Ports?

October 1, 2020

How Can You Secure Risky Open Ports?
One of the reasons business leaders struggle to understand cybersecurity risk is that the technical terminology often feels outside their wheelhouse. Organizational leaders understand the impact of data breaches, but reading about how cybercriminals infiltrate networks can feel like listening to a different… Read More
Tech Center
What’s the Role of Cybersecurity in Procurement?

September 23, 2020

What’s the Role of Cybersecurity in Procurement?
Modern procurement processes incorporate multiple technologies to streamline internal enterprise processes. Whether using enterprise resource planning (ERP) platforms or less sophisticated software, organizations increasingly leverage digital tools for managing procurement. As a company’s IT stack adds more e-procurement tools, the role of cybersecurity in the procurement process becomes integral to… Read More
Tech Center
Healthcare IT Security and Compliance in 2024 and Beyond: A Comprehensive Guide

August 26, 2020

Healthcare IT Security and Compliance in 2024 and Beyond: A Comprehensive Guide
The healthcare industry remains a prime target for cyberattacks, with the growing adoption of digital health technologies escalating the risk. Hospitals and clinics, custodians of vast amounts of sensitive patient data, are particularly vulnerable. As the industry navigates the digital landscape, ensuring cybersecurity compliance is paramount to protecting patient… Read More
Healthcare
Services
Tech Center
What is a Third-Party Vendor? Tips for Managing Vendor Risk

July 23, 2020

What is a Third-Party Vendor? Tips for Managing Vendor Risk
A third-party vendor is a company or entity with a direct written contract to provide products or services to your customers on your organization’s behalf. In today’s digital landscape, organizations are heavily reliant on third-party vendors who help carry out day-to-day operations more efficiently. These vendors… Read More
Attack Surface Management
Tech Center
8 Effective Vendor Due Diligence Best Practices

July 13, 2020

8 Effective Vendor Due Diligence Best Practices
Across industries, vendors are becoming essential assets to many organization’s day-to-day operations. However, it’s important to note that when an organization decides to work with or acquire a vendor, they are agreeing to take on any potential threats or drawbacks posed by the company, as well as its digital operations. Read More
Tech Center
5 Ways Data Breaches Affect Organizations

May 18, 2020

5 Ways Data Breaches Affect Organizations
Most businesses are concerned about data breaches, and they’re right to be worried. Cyber attacks are invasive, frightening, and one data breach can cost an organization millions of dollars. According to the Ponemon Institute’s annual Cost of a Data Breach report, one data breach can cost a… Read More
Tech Center
The CISO’s Guide to Reporting Cybersecurity to the Board

April 6, 2020

The CISO’s Guide to Reporting Cybersecurity to the Board
Organizations have multiple stakeholders, all of whom have varying levels of cybersecurity knowledge and interest. As a CISO, you need to be able to demonstrate the effectiveness of the cybersecurity solutions you employ with regard to each stakeholders’ area of expertise. Using key performance indicators (KPIs) provides visibility into your… Read More
Tech Center
What is Cybersecurity Analytics? Definition & Use Cases

April 3, 2020

What is Cybersecurity Analytics? Definition & Use Cases
What Is Cybersecurity Analytics? Cybersecurity analytics is the use of data collection, aggregation, (note: remove link) attribution, and data analysis to extract the information necessary for a proactive approach to cybersecurity.  Traditional security information and event management systems (SEIMs) rely on (note:… Read More
Security Ratings
Tech Center
The Role of Cybersecurity in Enterprise Risk Management (ERM)

March 24, 2020

The Role of Cybersecurity in Enterprise Risk Management (ERM)
As businesses continue to undergo digital transformation, cybersecurity must be included in the enterprise risk management framework. Without a comprehensive ERM program that addresses various risks  – such as strategic, operational, and security risks – organizations are limited in their ability to effectively identify… Read More
Tech Center
What is Cyber Threat Intelligence? A Complete Guide

March 12, 2020

What is Cyber Threat Intelligence? A Complete Guide
With cyber threats becoming increasingly difficult to track and manage, IT professionals must take a proactive approach to security in order to protect their assets from a breach. This requires ongoing visibility into the threat landscape and the methods cyber adversaries are employing to carry out attacks. One way this… Read More
Cyber Threat Intelligence
Tech Center
The Ultimate Service Provider Due Diligence Checklist

January 27, 2020

The Ultimate Service Provider Due Diligence Checklist
When you’re managing your cyber risk, you’re not just managing the risk that comes from within your organization. You need to worry about your third parties as well. Third parties like service providers can be a worrying source of risk. They often have access to sensitive information, you… Read More
Tech Center
4 Ways to Optimize Your Third Party Cyber Risk Management (TPCRM) Program

January 6, 2020

4 Ways to Optimize Your Third Party Cyber Risk Management (TPCRM) Program
Managing your Third Party Cyber Risk Management (TPCRM) can be a tedious, time-consuming task, yet it is a critical one. Third parties pose a significant source of risk for most businesses. According to Ponemon’s 2018 Data Risk in the Third-Party Ecosystem report, 59% of respondents had reported a third-party-related data… Read More
Supply Chain Cyber Risk
Tech Center
Network Security Assessments: What They Are And Why You Need Them

December 20, 2019

Network Security Assessments: What They Are And Why You Need Them
What would happen if your organization’s networks were breached today? Do you know how many records would be exposed? Would you be able to find out immediately that there had been a breach? Most importantly — are your network’s defenses adequate to repel or respond to an attack?… Read More
Attack Surface Management
Tech Center
What is Cybersecurity Performance Management?

September 12, 2019

What is Cybersecurity Performance Management?
Cybersecurity performance management is the process of evaluating and overseeing the effectiveness of your security program. It can be a challenge to manage, as the usual performance management indicators — cost and revenue — don’t apply. Additionally, the field is always changing; new technologies evolve and threats are advancing… Read More
Tech Center