How Old Vulnerabilities Introduce Zero-Day Risks
Zero-day risks from bad vulnerability management allows previously reported vulnerabilities to reappear as new.
You Can’t Patch What You Can’t See (Why Asset Discovery is an Essential Piece of Vulnerability Management)
The first step in effective vulnerability management is effective asset discovery — identifying and mapping all the assets in your environment.
What To Know About The Top 15 Exploited Vulnerabilities
A recent joint cybersecurity advisory from U.S and allied cybersecurity authorities identified the top exploited vulnerabilities and exposures (CVEs).
Four Questions Your Board Will Ask You About Cyber Risk
Here are the top 4 questions you should expect board members to ask you, and how you can best answer them.
How Integrated Cyber Risk Management Helps Your Organization
In today’s world, organizations need to have accurate and complete visibility into their entire asset inventory, associated vulnerabilities, and threat landscape, including third-party risks, to understand their complete risk exposure levels to develop a plan for improved cyber risk management outcomes. The problem is, there are a lot of risk management solutions that claim to […]
Cyber Risk Scoring- The FortifyData Scoring Methodology
Cyber risk scoring and security rating methodology for FortifyData security rating. Description of score ranges explained.
Four reasons your current cybersecurity rating is not comprehensive
Are you using a cybersecurity risk rating to assess cyber risk exposure? Is it comprehensive and accurate? Learn the four reasons it may not be.
5 Ways to Protect Your Company Against Ransomware
It is critical that organizations prioritize defending their networks against ransomware attacks. Find out how.
Cybersecurity Risk Assessment Basics
About the Author: Anthony Ortega has more than 20 years of experience in cybersecurity, configuration management, systems engineering, and project management. He is currently nearing completion of his doctor of management in information systems technology degree.
Cyber Attacks: The New Snow Day