Ransomware. The very name strikes fear in the heart of organizations. This type of malware attack isn’t new, but it’s more popular than ever before. The scourge of ransomware is now in the news on a weekly basis, as companies all over the world — big and small, public and private — wonder if it will be their company in […]
Read more ›Articles By: Recorded Future
A Guide to Brand Protection: The Top Three Threats Facing Your Organization
Your brand is your most valuable asset, and has the potential to be your ultimate competitive advantage. Brands that have been methodically built over many years and decades can be destroyed overnight with a successful cyberattack — 80% of consumers will defect from a business that has compromised their data. In an effort to help your organization understand the top […]
Read more ›Executive Brief: Inside the Dark Web
Only 42% of companies are actively monitoring the dark web for threats. That is a surprisingly low number when so many threat actors are planning their next attack on the dark web. If your organization isn’t monitoring the dark web, you could be missing out on important information regarding your security. However, monitoring the dark web requires a large investment […]
Read more ›Real Examples of Third-Party Risk: Lawsuits, Millions of Dollars, and Reputational Damage
Securing your own organization against threat actors is hard enough. Add in all of the ways you can be exposed to danger through your third-party vendors and the idea of being fully secure seems nearly impossible. When Blackbaud experienced a ransomware attack, the number of organizations impacted totaled nearly 250, and the SolarWinds supply chain attack led to between 40 […]
Read more ›How Brand Protection Safeguards Your Customers and Your Reputation
Your organization’s most important asset is its brand. The brand encompasses everything — the people, services, products, interactions — that comes to mind when thinking about your organization. Any damage done to your brand as a whole has an outsize effect and can cause the public to lose trust, and ultimately choose another option. Case in point: 80% of consumers […]
Read more ›Patch What Matters with Risk-Based Vulnerability Management
Patching vulnerabilities is critical for protecting an organization’s data and assets. 60% of breaches have been linked to a vulnerability where a patch was available but not applied. However, identifying which vulnerabilities are a priority is difficult, and relying on CVSS scores alone won’t do the job. Of the 18,000 vulnerabilities identified in 2020, nearly 60% fell into the categories […]
Read more ›The Security Intelligence Handbook, Third Edition
The latest edition of our popular book paints a clear picture of security intelligence, as well as actionable guidance for disrupting the threat actors targeting your organization right now — and in the future. “The Security Intelligence Handbook” is your definitive guide for proactive risk reduction. This edition has been updated to include a new foreword about the unprecedented state […]
Read more ›Digital (IT) Governance Is Broken: 9 Ways Enterprises Mismanage Their Cyber Risk
In this paper, security and risk experts Levi Gundert and Courtenay Brammar draw from consulting experience, candid conversations with security leaders, and empirical research to tackle this major issue facing enterprise organizations. Download this white paper to learn more about the issues currently plaguing enterprise cyber governance and the specific remedies for organizational leaders striving for an effective governance model.
Read more ›