Category: Cybersecurity

Cybersecurity

Red Sift report uncovers the global state of cyber resilience  

Sean Costigan

By Dr. Sean Costigan, Director of Cyber Policy for Red Sift As our digital world grows increasingly interconnected and attack tactics and techniques grow both prevalent and more sophisticated, cyber resilience is a requirement for modern organizations. Yet achieving resilience remains elusive for most. To help organizations achieve cyber resilience, Red Sift conducted a…

Read more
Cybersecurity

How to Identify and Prevent Supply Chain Attacks?

Red Sift

With the increasing reliance on complex supply chains that span across various vendors and service providers, these supply chain cyber threats have become a genuine concern in the cybersecurity space and require a more proactive approach to mitigate these risks. ...Continue Reading: How to Identify and Prevent Supply Chain Attacks?

Read more
Cybersecurity

The 8 biggest cyber threats faced by enterprises today and how to…

Red Sift

As of 2022, the global average cost per data breach amounted to 4.35 million USD. Irrespective of the size and industry, all types of IT-driven enterprises are prone to impersonation-based cyber attacks like BEC (Business Email Compromise), whale phishing, DNS spoofing, social engineering, etc. ...Continue Reading: The 8 biggest cyber threats faced by enterprises today…

Read more
Brand Protection

How are attack vectors and attack surfaces related?

Red Sift

Security experts need reports of continuous asset discovery over a specific attack surface to mitigate cyber risks. Cybercriminals exploit vulnerable assets using attack vectors. This blog discusses the connection between these two terms that are mistakenly used interchangeably...Continue Reading: How are attack vectors and attack surfaces related?

Read more
Cybersecurity

What is an Attack Surface? Understanding Attack Surface Management (ASM) and Monitoring

Red Sift

Attack Surface Management or ASM is an emerging priority for IT-driven businesses aiming to complement their existing security testing and monitoring. It’s the process of continuous asset discovery, inventory, classification, and monitoring of a company’s technical architecture...Continue Reading: What is an Attack Surface? Understanding Attack Surface Management (ASM) and Monitoring

Read more
Cybersecurity

The Data Must Flow (Part 2)

Sean Costigan

We take a serious look at new privacy regulations, data frameworks, and the return on investment for cybersecurity compliance...Continue Reading: The Data Must Flow (Part 2)

Read more