Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.

Filter by Topic

Filter by Date

Monitoring Necurs - The tip of the iceberg

Anubis Networks began monitoring Necurs, a malware family known for it's rootkit capabilities, in August 2015. Since then we have been able to observe approximately 50.000 unique IP addresses connecting to our sinkhole over a 24 hour...


BitSight Insights: A Global View of Security Performance

BitSight is proud to announce the release of our latest research report, ”BitSight Insights Global View: Revealing Security Metrics Across Major World Economies”. This report looks at the Security Ratings of a random sample of 250...


Do Investors Care About Cybersecurity?

Given the financial, reputational, and legal harm that can arise from cyber breaches, corporate shareholders and investors are increasingly concerned about the cybersecurity of the companies in their investment portfolio. How will...


The Newest Role Of The Board Of Directors: Cybersecurity

Over the last several years, there has been a growing chorus of security professionals advocating for a new responsibility in boards: focusing more on cybersecurity. This is a valid concern, as threat actors in recent years have proven...


The Top Cybersecurity Threats Of 2016: An Overview For Board Meetings

Boards today have a vested interest in the cybersecurity posture of their companies. Because of this, board members are increasingly interested in being briefed on top cybersecurity threats and understanding the countermeasures that...


Which Vendor Management Metrics Should You Be Tracking?

“You can’t manage what you can’t measure.”

This adage may be overused in business, but there’s a reason for it. Simply put, if you want to improve efficiency in your vendor risk management program or get a better look at your vendor’s...


4 Cybersecurity Metrics To Report To The Board

There are many different metrics that the CISO or CIO collects to measure the performance and effectiveness of its cybersecurity program. But only a select number of these metrics hold enough weight to be reported to the C-suite. The...


UK Cybersecurity Strategy: 5 Things To Keep In Mind

We’ll start by saying there isn’t anything inherently different about a U.K. cybersecurity strategy compared to one in, say, the U.S. But many countries do face some specific cybersecurity strategy challenges, whether they’re regulatory...


Introduction To Information Risk Management In The UK

Before we go into details about managing information risk, let’s start with a working definition we can refer back to:

Information risk management (IRM) is comprised of the policies, procedures, and technology one adopts in order to...

Load More

Get the Weekly Cybersecurity Newsletter.