ProcessBolt Case Studies
Other News
As Cyber Attacks Rise, So Does the Cost of Cyber Insurance
Over the last few years, cyber threats have surged and regulations have evolved, both of which have impacted the price and availability of cyber insurance. After the more recent and costly attacks,...
False Hope: Downsides of an Exchange Model for Vendor Risk Assessments
A common complaint of vendor risk assessments is time. The time it takes a vendor to complete assessments, the time it takes the assessor to review the assessments, and the time it takes for gap...
Zero-Trust Security in a Post-Pandemic World
The old security adage, “Trust, but verify,” no longer works in this hybrid workforce world. When IT departments scrambled to get their workers moved out of the office and into their own unsecure...
Why Penetration Testing is Not Enough
As the coronavirus wave recedes, another surges: cybersecurity. The new work-from-home norm has wreaked havoc on corporate IT and security teams, who are now scrambling to keep employee laptops safe...
Third-Party Breach and the Ukraine Conflict
On January 11, 2022, the U.S. Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), and National Security Agency (NSA) issued a joint warning, advising...
Third-Party Connectivity Risk
With much publicity focused on the risk of confidential data breaches, the risk associated with the actual connection to and from a third party to your organization is often overlooked. Customers,...