Validate Vendor Risk Management with a Security Checklist We’ve compiled a checklist of items that your company can use to protect its infrastructure whenever it starts working with a new vendor, as part of routine vendor risk management processes. A vendor’s systems can be a threat to you when both parties’ systems are connected together. This … ContinuedRead More
Keep Track of SMB Security & Third Party Security Risks The big name brands may get all the security and data breach attention, but that does not mean that is where all of the data breaches and hacks are occurring. As we look closer at the entire security and risk management threat landscape and include small and … ContinuedRead More
SecurityScorecard Digs into the Grades of UK Banks A Freedom of Information request in the UK has revealed 791 data breaches occurred at most of the region’s major banks since the start of 2013 (with 585 of the incidents occurring in 2014). The FOI request was spawned by Egress Software Technologies, an email encryption provider, that recently reported … ContinuedRead More
Prediction: Mobile App Security Practices Will Become a Third Party Data Risk Mobile security may not be as easy to exploit as other established attack styles, but this latest news could change that for the worse. The Center for Advanced Security Research Darmstadt (CASED) in Germany has responsibly disclosed a cloud application security issue it discovered and published … ContinuedRead More
Recently LinkedIn has been flooded with malicious actors using fake accounts pretending to business individuals in legitimate institutions in order to engage in an interesting variant of “419”-style phishing attacks. The attackers will reach out to create new contacts over a period of time. The message will tell the intended victim that they wish to … ContinuedRead More
Download 2016 Biggest Holiday Retailers Cybersecurity Report
Find out the names of the 10 biggest holiday retailers with the best security posture in 2016. From April 2016 to October 2016, SecurityScorecard analyzed the security posture of the 48 'Biggest Holiday Retailers' to find the most prevalent security vulnerabilities and compliance issues.