Third party cyber risk is a growing concern for organizations, as breaches and hacks tied to third party providers and applications multiply. How do you know if your third party cyber risk management program is up to the task? Our new e-book, sponsored by CyberGRX, will help you figure it out!
Three years after the Mirai botnet launched some of the biggest denial of service attacks ever seen, DDoS is a bigger problem and ever. Even worse: we stand on the made up of webcams and other Internet of things as technologies like 5G bring greater bandwidth to connected endpoints. In this podcast, we speak with Hardik Modi, the senior director of threat intelligence at the firm NetScout Systems* about the lessons from his company’s latest threat intelligence report.
A survey of more than 6,000 firmware images spanning more than a decade finds no improvement in firmware security and lax security standards for the software running connected devices by Linksys, NETGEAR and other major vendors.
How does a flaw potentially affecting the integrity of printer management application get a “critical” severity rating and one affecting the integrity and operation of anesthesia machines get a “moderate” severity rating? It has to do with our evolving and still immature system of rating (and therefore thinking about) cyber risk.
A survey of security professionals who have attended Black Hat reveals fears for From the 2020 Election, U.S. infrastructure