Introduction The concept of an attack surface monitoring and management tool like ProcessBolt ThreatScape is that we can use publicly available information to provide us with some indicators of how an organization’s information security program is doing, and therefore...
Numerous surveys of the U.S. workforce and business owners indicate that return-to-office plans are still on hold, a fact that pleases a growing number of employees who have found increased productivity and reduced spending during the pandemic. However, business...
Today, building a successful vendor risk management (VRM) strategy goes far beyond sending out spreadsheets or finding a SaaS tool to assess your vendors. According to the law, this step will check the due diligence box, but if you really want to keep your...
NIST and other vulnerability detection groups have the job of immediately alerting enterprises to new cyber threats. Then, VRM teams have the job of immediately responding. This represents a major shift. Not long ago, information security measures such as system...
Cloud computing and coronavirus are among the most consequential forces impacting cybersecurity today. Together, they have created an “endpoint explosion.” Yesterday’s periodic measures are important; however, the only way to manage today’s cyber risks is with a...