How to enhance your cyber defense program with CIS SecureSuite

Join this webinar to learn how you can prioritize your security program to meet the requirements of regulatory and compliance frameworks with the CIS Critical Security Controls and CIS Benchmarks, as well as how to assess and implement secure configura… Continue reading How to enhance your cyber defense program with CIS SecureSuite

Cyber-attack defense: CIS Benchmarks + CDM + MITRE ATT&CK

Six trillion dollars. That’s how much global cybercrime cost the world’s economy in 2021, according to Cybersecurity Ventures. In an effort to take a bite out of that number, the Center for Internet Security (CIS) is committed to validating… Continue reading Cyber-attack defense: CIS Benchmarks + CDM + MITRE ATT&CK

Download: CISO’s guide to choosing an automated security questionnaire platform

Failing to adequately screen suppliers’ security can lead to data breaches, which can shut down operations, damage customer trust and incur hefty regulatory penalties. An automated security questionnaire platform can vastly accelerate and scale the ven… Continue reading Download: CISO’s guide to choosing an automated security questionnaire platform

State of Pentesting 2022 report: Interactive event and open discussion

In The State of Pentesting 2022 Report, Cobalt studied data from 2,380 pentests and surveyed 602 cybersecurity and software development professionals. The report focuses on issues and stats relevant to both the security and development teams. Join the … Continue reading State of Pentesting 2022 report: Interactive event and open discussion

Product showcase: Enclave – using zero trust network access to simplify your networks

A huge number of Internet-accessible systems are protected by the principle of connect, then authenticate. This includes VPNs, web applications, databases, Windows Servers with RDP endpoints exposed, and more. Having a “private” system which is publicl… Continue reading Product showcase: Enclave – using zero trust network access to simplify your networks

Product showcase: Enclave – using zero trust network access to simplify your networks

A huge number of Internet-accessible systems are protected by the principle of connect, then authenticate. This includes VPNs, web applications, databases, Windows Servers with RDP endpoints exposed, and more. Having a “private” system which is publicl… Continue reading Product showcase: Enclave – using zero trust network access to simplify your networks

Results overview: 2022 MITRE ATT&CK Evaluation – Wizard Spider and Sandworm edition

Threat actor groups like Wizard Spider and Sandworm have been wreaking havoc over the past few years – developing and deploying cybercrime tools like Conti, Trickbot, and Ryuk ransomware. Most recently, Sandworm (suspected to be a Russian cyber-militar… Continue reading Results overview: 2022 MITRE ATT&CK Evaluation – Wizard Spider and Sandworm edition

Results overview: 2022 MITRE ATT&CK Evaluation – Wizard Spider and Sandworm edition

Threat actor groups like Wizard Spider and Sandworm have been wreaking havoc over the past few years – developing and deploying cybercrime tools like Conti, Trickbot, and Ryuk ransomware. Most recently, Sandworm (suspected to be a Russian cyber-militar… Continue reading Results overview: 2022 MITRE ATT&CK Evaluation – Wizard Spider and Sandworm edition

Design, prioritize, and implement a cyber defense program with CIS CDM 2.0

The Center for Internet Security (CIS) Community Defense Model (CDM) v2.0 can be used to design, prioritize, implement, and improve an enterprise’s cybersecurity program. Enterprises naturally want to know how effective the CIS Critical Security Contro… Continue reading Design, prioritize, and implement a cyber defense program with CIS CDM 2.0