Cyber Security Risk Assessment Checklist

Cyber Security Risk Assessment Checklist Navigating the complex landscape of cyber threats requires constant vigilance and proactive measures. Implementing a cyber security risk assessment and conducting cyber threat assessments is fundamental to understanding your vulnerabilities, prioritizing risks, and taking control of your organization’s security posture. This in-depth guide provides a cyber security risk assessment checklist […]

Top 10 Cyber Security Threats

Top 10 Cyber Security Threats Navigating the constantly changing landscape of cyber threats can feel like an uphill battle for even the most seasoned cybersecurity leaders. With new vulnerabilities emerging seemingly every day, staying ahead of the curve requires constant vigilance and a proactive approach. This article explores the top 10 cyber security threats currently […]

Volt Typhoon APT group targeting legacy SOHO routers

Volt Typhoon APT group targeting legacy SOHO routers Volt Typhoon APT group targeted legacy SOHO routers; CVE-2021-40539, CVE-2021-27860  On January 31, 2024 the FBI shut down Volt Typhoon APT group targeting US infrastructure with hidden “KV-Botnet”.  Researchers have uncovered a hidden botnet dubbed “KV-Botnet” used to attack crucial US organizations like government agencies and communication […]

What to know in Germany about Digital Operational Resilience Act

What to know in Germany about Digital Operational Resilience Act Germany is currently confronted with significant challenges. There is a rise in geo-political conflicts and associated risks that are affecting its economy – that includes increasing cyber-attacks that poses a significant threat to the economy of Germany with implications for the rest of the world […]

Bringing True Risk Representation to Security Ratings Metrics

Bringing True Risk Representation to Security Ratings Metrics Standardised cyber security performance metrics are essential for evaluating and comparing the effectiveness of security practices between different organisations. However, there can be challenges in defining and implementing these metrics, like a security rating, due to a lack of uniformity and consensus in the industry.   Would a […]

What is the NIST Cyber Risk Score?

What is the NIST cyber risk score? In the ever-evolving landscape of cyber security, staying ahead of threats and vulnerabilities is paramount. Enter the National Institute of Standards and Technology (NIST) cyber risk score, a powerful tool that helps organizations assess their security posture and prioritize areas for improvement using a NIST rating scale. But […]

What is a NIST CSF Score?

What is a NIST CSF Score? In the ever-evolving landscape of cyber threats, organizations are constantly seeking ways to assess and strengthen their security posture. Enter the NIST Cybersecurity Framework (CSF), a comprehensive framework that provides a roadmap for managing cybersecurity risks and improving overall security. But what about the NIST CSF score? This often-mentioned […]

What is the Difference Between BitSight and Prevalent?

What is the Difference Between BitSight and Prevalent? What is an alternative to BitSight? The Bitsight tool is a common security ratings tool; having been one of the first and early technologies to provide a security rating. While BitSight is a well-established name in the security ratings space, organizations seeking alternative solutions may consider Prevalent. […]

What is the NIST Rating Scale?

nist rating scale

What is the NIST Rating Scale? In the realm of cybersecurity, understanding various security ratings is crucial for organizations to manage and mitigate risks effectively as a metric that indicates low to high cybersecurity risk.   Among the many frameworks available, the National Institute of Standards and Technology (NIST) has a rating scale that provides a […]