You just had your first encounter with the "Headless Chicken Effect" during a security incident, like we mentioned in our last blog post. Maybe you like to be prepared against any possible scenario because you know that it's not a matter of 'if', but rather a matter of 'when'? In this second blogpost in our "Ransomware Readiness" series, we'll look into how you can better prepare yourself to face such incidents in the future, whether it's through planning, documentation, or testing.
Category: Cyber Strategy
The Importance of Establishing a Solid Third Party Risk Management Framework for Risk Mitigation
In the previous post, we introduced the concept of Third-Party Risk Management (TPRM) and its importance in today’s interconnected world. Now, let us have a look at the practical aspects of building a solid TPRM program and why it is important for your company. 1. Start with a Third-Party Inventory The first step in building … Continue reading The Importance of Establishing a Solid Third Party Risk Management Framework for Risk Mitigation
Introduction to Third-Party Risk Management
In today’s world, organizations are increasingly depending on their third-party vendors, suppliers, and partners to support their operations. This way of working, in addition to the digitalization era we’re in, can have great advantages such as being able to offer new services quickly while relying on other’s expertise or cutting costs on already existing processes. … Continue reading Introduction to Third-Party Risk Management
Introducing BitSight Automation Tool
Glossary Introduction BitSight Automation Operations Structure Installation Prerequisites Configuration Generating an API key for your BitSight account Adding the API Key to the BitSight Automation Tool Windows Linux The group_mapper.json file The guid_mapper.json file Configuring your Company's structure The groups.conf file Letting BitSight Automation Tool handle the rest Binding into Executable Execution Usage Use Cases … Continue reading Introducing BitSight Automation Tool
Implementing Business Continuity on Azure
There is a general misconception among cloud consumers that the availability of their resources in the cloud is always guaranteed. This is not true since all cloud providers, including Microsoft, offer specific SLAs for their products that almost never reach an availability target of 100%. For the consumers who have deployed critical resources and applications … Continue reading Implementing Business Continuity on Azure
Lower email spoofing incidents (and make your marketing team happy) with BIMI
Introduction Over the last couple of years, we saw the amount of phishing attacks skyrocket. According to F5, a multi-cloud security and application provider, there was a 220% increase of incidents during the height of the global pandemic compared to the yearly average. It’s expected that every year there will be an additional increase of … Continue reading Lower email spoofing incidents (and make your marketing team happy) with BIMI






